General

  • Target

    a7b322371217b5f4a41f7ec113b5f00d_JaffaCakes118

  • Size

    7.2MB

  • Sample

    240614-csv1tasajc

  • MD5

    a7b322371217b5f4a41f7ec113b5f00d

  • SHA1

    fcb42e199d943f01988e83f5f75a73fd70fdca7d

  • SHA256

    53a779c43e0567ce3816eb4f7405b36891ba332c344100685c9fd20e13594f8f

  • SHA512

    f5b55921cfec7fcf259a16363ee9157c612e2ab10e6722e58ce1d380317f34cb3896a8f66646cb1a27857b235cff64e6fbbb2237022c296effb1449572d2afde

  • SSDEEP

    98304:FaHq152jTzXi/uEf5SD1XACF9MaS/ekwr31KbHdhHcf3/9b7BCDhh5ez775:FaG2jvX2etAW9CcKbHd2vBVIh5o7N

Malware Config

Targets

    • Target

      a7b322371217b5f4a41f7ec113b5f00d_JaffaCakes118

    • Size

      7.2MB

    • MD5

      a7b322371217b5f4a41f7ec113b5f00d

    • SHA1

      fcb42e199d943f01988e83f5f75a73fd70fdca7d

    • SHA256

      53a779c43e0567ce3816eb4f7405b36891ba332c344100685c9fd20e13594f8f

    • SHA512

      f5b55921cfec7fcf259a16363ee9157c612e2ab10e6722e58ce1d380317f34cb3896a8f66646cb1a27857b235cff64e6fbbb2237022c296effb1449572d2afde

    • SSDEEP

      98304:FaHq152jTzXi/uEf5SD1XACF9MaS/ekwr31KbHdhHcf3/9b7BCDhh5ez775:FaG2jvX2etAW9CcKbHd2vBVIh5o7N

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks