General

  • Target

    9b03ce94ebcd7bf3f76ff3f2eddd7ea7_JaffaCakes118

  • Size

    15.6MB

  • Sample

    240610-rz4zmazbpb

  • MD5

    9b03ce94ebcd7bf3f76ff3f2eddd7ea7

  • SHA1

    ab813aec5aa098f618e149e0b307d5fa906ea8ca

  • SHA256

    96a703860b47f7eed9f357fd2ef1a1cc78f691c4325bb4a5e9d6958973fd1d2e

  • SHA512

    28b3db3de3a6651537b3137c88e9af9cd79ec673b506944072d5180ab8f02aeb310d2b06a1236233fc8dcb887067c98a023f8c7445a057b93fa8316db6ac23ab

  • SSDEEP

    393216:uhu+4SokC7y4I4aUPQ5YfdC9M8VzLINTUdcjnQTfNzsG:AAH7yofPQ5Yfo/VzE9Udq81gG

Malware Config

Targets

    • Target

      9b03ce94ebcd7bf3f76ff3f2eddd7ea7_JaffaCakes118

    • Size

      15.6MB

    • MD5

      9b03ce94ebcd7bf3f76ff3f2eddd7ea7

    • SHA1

      ab813aec5aa098f618e149e0b307d5fa906ea8ca

    • SHA256

      96a703860b47f7eed9f357fd2ef1a1cc78f691c4325bb4a5e9d6958973fd1d2e

    • SHA512

      28b3db3de3a6651537b3137c88e9af9cd79ec673b506944072d5180ab8f02aeb310d2b06a1236233fc8dcb887067c98a023f8c7445a057b93fa8316db6ac23ab

    • SSDEEP

      393216:uhu+4SokC7y4I4aUPQ5YfdC9M8VzLINTUdcjnQTfNzsG:AAH7yofPQ5Yfo/VzE9Udq81gG

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks