General

  • Target

    9857cd9ce6cfbf007b735bf990e9a908_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240605-rb255ahc2s

  • MD5

    9857cd9ce6cfbf007b735bf990e9a908

  • SHA1

    ce722365dd2d166122db66ee0ce1345698038bda

  • SHA256

    850bcb00312f272c42a64198d7532319d63054979cae89670a168a08bbdeae40

  • SHA512

    21e9d1968ea51cdc484cc4247b359f9f91abf75bb7a323f041206c3fdd24b45a59d59cf69356a90f645e7861d6ba8d08f56f08f0fad896de7c4ac9d0b202db2c

  • SSDEEP

    49152:TW7MDX6WzfXMokfAjLOIsiWvvZOIFMJOfEXEzEXY/eY3O8CrtBvY:TW7MDX6QXPIUsiWnYzJeEUwX0RjCQ

Malware Config

Targets

    • Target

      9857cd9ce6cfbf007b735bf990e9a908_JaffaCakes118

    • Size

      1.9MB

    • MD5

      9857cd9ce6cfbf007b735bf990e9a908

    • SHA1

      ce722365dd2d166122db66ee0ce1345698038bda

    • SHA256

      850bcb00312f272c42a64198d7532319d63054979cae89670a168a08bbdeae40

    • SHA512

      21e9d1968ea51cdc484cc4247b359f9f91abf75bb7a323f041206c3fdd24b45a59d59cf69356a90f645e7861d6ba8d08f56f08f0fad896de7c4ac9d0b202db2c

    • SSDEEP

      49152:TW7MDX6WzfXMokfAjLOIsiWvvZOIFMJOfEXEzEXY/eY3O8CrtBvY:TW7MDX6QXPIUsiWnYzJeEUwX0RjCQ

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks