General

  • Target

    a5e04b3872554d76443ff6dae4aaa946_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240613-q5tkea1fpd

  • MD5

    a5e04b3872554d76443ff6dae4aaa946

  • SHA1

    e3aea768fba1a76b34aef29e7389214094276081

  • SHA256

    b2b774d6cf980716984a5f71831ed8c3f554069d97e3833805d4388b98d438f0

  • SHA512

    d6e3dfb8186094e2112edb993f93cc8d2ec56ecf9bd3c7976eda1ca564b5b8e983250e10fd412bd612742b2e4a75cdd78eea67bc4ac2cad693a0857df2415bc1

  • SSDEEP

    98304:3IJD4NQ3uGyUUPef1s2n9fYlk1B3kDvvcR2SgJBo/i:Yh4NPdWfGMwi2SgJd

Malware Config

Targets

    • Target

      a5e04b3872554d76443ff6dae4aaa946_JaffaCakes118

    • Size

      4.1MB

    • MD5

      a5e04b3872554d76443ff6dae4aaa946

    • SHA1

      e3aea768fba1a76b34aef29e7389214094276081

    • SHA256

      b2b774d6cf980716984a5f71831ed8c3f554069d97e3833805d4388b98d438f0

    • SHA512

      d6e3dfb8186094e2112edb993f93cc8d2ec56ecf9bd3c7976eda1ca564b5b8e983250e10fd412bd612742b2e4a75cdd78eea67bc4ac2cad693a0857df2415bc1

    • SSDEEP

      98304:3IJD4NQ3uGyUUPef1s2n9fYlk1B3kDvvcR2SgJBo/i:Yh4NPdWfGMwi2SgJd

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks