General

  • Target

    a7b300a4306b875f1b1da5a4e10748e2_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240614-csj9bawakp

  • MD5

    a7b300a4306b875f1b1da5a4e10748e2

  • SHA1

    86d9caa516bcd1c734e29a3d6ad001bb0173e261

  • SHA256

    2a3109cf0607c79ad20893bbcc9ba6f4b59dcf50ff2f37d0a0c0b113e4329bd2

  • SHA512

    9cb917fce83e75c4665affc7a1768186e5c3736a0f9cb6a4b6277665c5f95dc9697f738766faf48d0054a8b7fc5394c98aaa03044001a8ff32f5d646cc8a4f19

  • SSDEEP

    98304:Qa8IG1em4SOUsALcOHAnGr7cc13PcJ4baPBhpZ0l4SODBzjXs66dRCiBiZX8SjvJ:QrH1T4SOdQmn8QEcJ4baVs4SOobBi184

Malware Config

Targets

    • Target

      a7b300a4306b875f1b1da5a4e10748e2_JaffaCakes118

    • Size

      5.4MB

    • MD5

      a7b300a4306b875f1b1da5a4e10748e2

    • SHA1

      86d9caa516bcd1c734e29a3d6ad001bb0173e261

    • SHA256

      2a3109cf0607c79ad20893bbcc9ba6f4b59dcf50ff2f37d0a0c0b113e4329bd2

    • SHA512

      9cb917fce83e75c4665affc7a1768186e5c3736a0f9cb6a4b6277665c5f95dc9697f738766faf48d0054a8b7fc5394c98aaa03044001a8ff32f5d646cc8a4f19

    • SSDEEP

      98304:Qa8IG1em4SOUsALcOHAnGr7cc13PcJ4baPBhpZ0l4SODBzjXs66dRCiBiZX8SjvJ:QrH1T4SOdQmn8QEcJ4baVs4SOobBi184

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks