General

  • Target

    a3dc92f199e42cfc32917137a76af620_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240613-fdg27avclb

  • MD5

    a3dc92f199e42cfc32917137a76af620

  • SHA1

    386d188c63fef38589a047d0dfba2637727cd202

  • SHA256

    c16de6dd0e8c317960b4d8d9798bf7bc0078e4417ca91c0c0f34ca4b7ccd6697

  • SHA512

    39f1d0a674af543c44324529661288b7ae8c5cafd9b883f16a7a0fa31dfc652a7c11c092547224f6de90b82d89e07377ab23aac5e1c77503e6b739821a115e5e

  • SSDEEP

    98304:wE7M+YdWFBw6fVmvSnAMltxoP2wDBDqhZi6P1rCHGCHybv:wEg+lI6fQOiewdDeo6P1rCmCe

Malware Config

Targets

    • Target

      a3dc92f199e42cfc32917137a76af620_JaffaCakes118

    • Size

      5.4MB

    • MD5

      a3dc92f199e42cfc32917137a76af620

    • SHA1

      386d188c63fef38589a047d0dfba2637727cd202

    • SHA256

      c16de6dd0e8c317960b4d8d9798bf7bc0078e4417ca91c0c0f34ca4b7ccd6697

    • SHA512

      39f1d0a674af543c44324529661288b7ae8c5cafd9b883f16a7a0fa31dfc652a7c11c092547224f6de90b82d89e07377ab23aac5e1c77503e6b739821a115e5e

    • SSDEEP

      98304:wE7M+YdWFBw6fVmvSnAMltxoP2wDBDqhZi6P1rCHGCHybv:wEg+lI6fQOiewdDeo6P1rCmCe

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks