General

  • Target

    97b6e8bbbdb4681d9a6f01edf030eebb_JaffaCakes118

  • Size

    11.8MB

  • Sample

    240605-k691wsbf5w

  • MD5

    97b6e8bbbdb4681d9a6f01edf030eebb

  • SHA1

    7b64f27efa02b7eab26787f64011ad2daea4e1c0

  • SHA256

    792bb25a14a6d7a9528af86100316483abd7ff329d88f73a50cdca5c097b6059

  • SHA512

    57927014f78644c3a4ab1ea958185a58884f37f0197e621b19c701cec6b3d4bbe71bddc6e2d89e12f5553cd949c7ab88042c8ce440674cdbc31c8db7dc8c8c27

  • SSDEEP

    196608:or3+XjQ2UZbw+N9xXRZ4Jma2w3kzkaWidE/nMCGBLXANSH9F0R9GAeglCSmM44Ld:2WTobwg3RZ4JmaT3kz0iy/HAXANwFEgW

Malware Config

Targets

    • Target

      97b6e8bbbdb4681d9a6f01edf030eebb_JaffaCakes118

    • Size

      11.8MB

    • MD5

      97b6e8bbbdb4681d9a6f01edf030eebb

    • SHA1

      7b64f27efa02b7eab26787f64011ad2daea4e1c0

    • SHA256

      792bb25a14a6d7a9528af86100316483abd7ff329d88f73a50cdca5c097b6059

    • SHA512

      57927014f78644c3a4ab1ea958185a58884f37f0197e621b19c701cec6b3d4bbe71bddc6e2d89e12f5553cd949c7ab88042c8ce440674cdbc31c8db7dc8c8c27

    • SSDEEP

      196608:or3+XjQ2UZbw+N9xXRZ4Jma2w3kzkaWidE/nMCGBLXANSH9F0R9GAeglCSmM44Ld:2WTobwg3RZ4JmaT3kz0iy/HAXANwFEgW

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks