General

  • Target

    a408440e12dd4d74902d09911ea4832b_JaffaCakes118

  • Size

    8.0MB

  • Sample

    240613-gc8n7azdrj

  • MD5

    a408440e12dd4d74902d09911ea4832b

  • SHA1

    fe67931e553e59f500efb0f530fe284538962a51

  • SHA256

    9c91f511a4c6d71f59cac878c6948143033e0876a30d8f83090777f58c6b98c6

  • SHA512

    c6ebdcf8398fc849fd7ee82f420c56ffac59b86a83b42fb5b1c1ba7798c3791d72610aa93e68d57c8ccf9448248a71ef0310a6057ffa0252cc7ccfc46cf02afe

  • SSDEEP

    196608:RAZrxrGMqtnjq2NXeXL2QshLzc+s6LNuVy9Dn63G42vtxEw2:S9ZJijFNXeXShLAM8VyxZvPE1

Malware Config

Targets

    • Target

      a408440e12dd4d74902d09911ea4832b_JaffaCakes118

    • Size

      8.0MB

    • MD5

      a408440e12dd4d74902d09911ea4832b

    • SHA1

      fe67931e553e59f500efb0f530fe284538962a51

    • SHA256

      9c91f511a4c6d71f59cac878c6948143033e0876a30d8f83090777f58c6b98c6

    • SHA512

      c6ebdcf8398fc849fd7ee82f420c56ffac59b86a83b42fb5b1c1ba7798c3791d72610aa93e68d57c8ccf9448248a71ef0310a6057ffa0252cc7ccfc46cf02afe

    • SSDEEP

      196608:RAZrxrGMqtnjq2NXeXL2QshLzc+s6LNuVy9Dn63G42vtxEw2:S9ZJijFNXeXShLAM8VyxZvPE1

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks