General

  • Target

    a7b29ced6a0601cd1c39dfcccffd1a14_JaffaCakes118

  • Size

    25.6MB

  • Sample

    240614-crmcaavhrp

  • MD5

    a7b29ced6a0601cd1c39dfcccffd1a14

  • SHA1

    5d89fbca2c9289a8d8b2cdc8cca2259d32c90c3d

  • SHA256

    957ef5c2ef5efbacb1469fb55de10c0a77169c77de8467b7ba5362530cdc8442

  • SHA512

    253f0bf3a887d4e1f49d0586f9a71e63e2709e318b98a936f71aa6175f3b3585da84fd93d3885838461ff33b25bb4b5b00e0204ddfcd37c95cf35e126584aeec

  • SSDEEP

    393216:U82k2Oj6viZeQLFkH+H/kSHrDPLE/hrDPL79+bHzx9oo5OCrLRuYPNzV4yGc7T55:8k2mZxGeH/PHqHobHzxz/vrNiVcPY6

Malware Config

Targets

    • Target

      a7b29ced6a0601cd1c39dfcccffd1a14_JaffaCakes118

    • Size

      25.6MB

    • MD5

      a7b29ced6a0601cd1c39dfcccffd1a14

    • SHA1

      5d89fbca2c9289a8d8b2cdc8cca2259d32c90c3d

    • SHA256

      957ef5c2ef5efbacb1469fb55de10c0a77169c77de8467b7ba5362530cdc8442

    • SHA512

      253f0bf3a887d4e1f49d0586f9a71e63e2709e318b98a936f71aa6175f3b3585da84fd93d3885838461ff33b25bb4b5b00e0204ddfcd37c95cf35e126584aeec

    • SSDEEP

      393216:U82k2Oj6viZeQLFkH+H/kSHrDPLE/hrDPL79+bHzx9oo5OCrLRuYPNzV4yGc7T55:8k2mZxGeH/PHqHobHzxz/vrNiVcPY6

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks