General

  • Target

    983a28131f438a47c5fcc8cacef11176_JaffaCakes118

  • Size

    31.4MB

  • Sample

    240605-p7xt6sga6w

  • MD5

    983a28131f438a47c5fcc8cacef11176

  • SHA1

    d08fe907eb12b4c08e2100b8afe7bfc22ada1769

  • SHA256

    c5a81cd05b3f7f8c8a0a17f0fe8cf62db7bc3b0f4d36468563241ad16d89ddce

  • SHA512

    df83a4e6e643024761d71fd3ed7b95aa2b400188ebd5b9d24b0edd44be9bc7b094f9051ff70f2959e4bdc5d16f90ef5d074c479cdb24c4d0afbc753cf96e8bc4

  • SSDEEP

    786432:dCqGEJ0crqVvMA8rsC+MogRn8XcZcVpcISVCOC1QTwcAhJ6:dzGSRubcsCrJryDvSVCOC1QTwcAG

Malware Config

Targets

    • Target

      983a28131f438a47c5fcc8cacef11176_JaffaCakes118

    • Size

      31.4MB

    • MD5

      983a28131f438a47c5fcc8cacef11176

    • SHA1

      d08fe907eb12b4c08e2100b8afe7bfc22ada1769

    • SHA256

      c5a81cd05b3f7f8c8a0a17f0fe8cf62db7bc3b0f4d36468563241ad16d89ddce

    • SHA512

      df83a4e6e643024761d71fd3ed7b95aa2b400188ebd5b9d24b0edd44be9bc7b094f9051ff70f2959e4bdc5d16f90ef5d074c479cdb24c4d0afbc753cf96e8bc4

    • SSDEEP

      786432:dCqGEJ0crqVvMA8rsC+MogRn8XcZcVpcISVCOC1QTwcAhJ6:dzGSRubcsCrJryDvSVCOC1QTwcAG

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks