General

  • Target

    9af947b072b2ea40ab6e5ff3b980a919_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240610-rql3fsygjg

  • MD5

    9af947b072b2ea40ab6e5ff3b980a919

  • SHA1

    fa7a92a0d054aa8946a0e34803105a536b22b9c0

  • SHA256

    22109dba4c94581ceab286e1f3aa88f510ec963e9e3ba324c964c31798abff6e

  • SHA512

    19673ca6f00b3f1ef14fac1bfbc34a20d13e4cd3c1bdc58df30e44dcab7d46a379e99a1acc67f1d2bade738e9c0890ca1b2a607506c0ac4d549afd4afe61fd2d

  • SSDEEP

    196608:gHV27+Ps5fYDR5nbMKmPHets9MurhZ1MQwVmXTkNoFbCNE1VfWaOb1d:gH65f05IKmvgur1MQwVQbCNmVfWaObb

Malware Config

Targets

    • Target

      9af947b072b2ea40ab6e5ff3b980a919_JaffaCakes118

    • Size

      11.4MB

    • MD5

      9af947b072b2ea40ab6e5ff3b980a919

    • SHA1

      fa7a92a0d054aa8946a0e34803105a536b22b9c0

    • SHA256

      22109dba4c94581ceab286e1f3aa88f510ec963e9e3ba324c964c31798abff6e

    • SHA512

      19673ca6f00b3f1ef14fac1bfbc34a20d13e4cd3c1bdc58df30e44dcab7d46a379e99a1acc67f1d2bade738e9c0890ca1b2a607506c0ac4d549afd4afe61fd2d

    • SSDEEP

      196608:gHV27+Ps5fYDR5nbMKmPHets9MurhZ1MQwVmXTkNoFbCNE1VfWaOb1d:gH65f05IKmvgur1MQwVQbCNmVfWaObb

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks