General

  • Target

    9af9557a2e2eba9a80603ced9a807ad9_JaffaCakes118

  • Size

    16.4MB

  • Sample

    240610-rqsj8szckn

  • MD5

    9af9557a2e2eba9a80603ced9a807ad9

  • SHA1

    07cb2a87b6834445a8bc03f37ca619b0f0295c96

  • SHA256

    25097f028bdf5bb1cb7986d09cd8e86d621cee18c747d2cd582b6a091fe79982

  • SHA512

    947d8a3616d10a725308695f762a85bc93a6cc40da1320289165ee8622c5b07703dee951471f72b69ee2aa53ec1766c884786ec2968622fdad4a693ac105d74c

  • SSDEEP

    393216:gnjfWH/Hxco45aQpuG1zeZ/icYjukwYM/03sTDI/KKX:gjS/xcoibpX16ej5wY3s/I/b

Malware Config

Targets

    • Target

      9af9557a2e2eba9a80603ced9a807ad9_JaffaCakes118

    • Size

      16.4MB

    • MD5

      9af9557a2e2eba9a80603ced9a807ad9

    • SHA1

      07cb2a87b6834445a8bc03f37ca619b0f0295c96

    • SHA256

      25097f028bdf5bb1cb7986d09cd8e86d621cee18c747d2cd582b6a091fe79982

    • SHA512

      947d8a3616d10a725308695f762a85bc93a6cc40da1320289165ee8622c5b07703dee951471f72b69ee2aa53ec1766c884786ec2968622fdad4a693ac105d74c

    • SSDEEP

      393216:gnjfWH/Hxco45aQpuG1zeZ/icYjukwYM/03sTDI/KKX:gjS/xcoibpX16ej5wY3s/I/b

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks