General

  • Target

    a45beca551ecd21fb59f78ede86f49ee_JaffaCakes118

  • Size

    5.0MB

  • Sample

    240613-hy1q5syelf

  • MD5

    a45beca551ecd21fb59f78ede86f49ee

  • SHA1

    311328912d699ea0a4633bc154607ddf9a664808

  • SHA256

    89c140d8b1eef6b9d49451faa4aa76ca59fb05fece4b7f874b8472eeae1baeb1

  • SHA512

    74e6b6c86b9c6b34624cd06a8d388d2a6d3c698b8cf3cc13f119f15a5bc773b90aab80a944f201daecdc9ab3a90f87a5e2dc3e04218cf2ba43dc5989420c84b7

  • SSDEEP

    98304:jUwnxgQb5c0rUXts8zP9dUhwZNHoETKftLF2e8cpSFfRt5Uzxs3FoJ:j5n+Qb5eds87MqZNZ+fvXIT50xs3+

Malware Config

Targets

    • Target

      a45beca551ecd21fb59f78ede86f49ee_JaffaCakes118

    • Size

      5.0MB

    • MD5

      a45beca551ecd21fb59f78ede86f49ee

    • SHA1

      311328912d699ea0a4633bc154607ddf9a664808

    • SHA256

      89c140d8b1eef6b9d49451faa4aa76ca59fb05fece4b7f874b8472eeae1baeb1

    • SHA512

      74e6b6c86b9c6b34624cd06a8d388d2a6d3c698b8cf3cc13f119f15a5bc773b90aab80a944f201daecdc9ab3a90f87a5e2dc3e04218cf2ba43dc5989420c84b7

    • SSDEEP

      98304:jUwnxgQb5c0rUXts8zP9dUhwZNHoETKftLF2e8cpSFfRt5Uzxs3FoJ:j5n+Qb5eds87MqZNZ+fvXIT50xs3+

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks