General

  • Target

    a7ccf98ab30ee4c14ef726389a5e7ee9_JaffaCakes118

  • Size

    20.3MB

  • Sample

    240614-dmtq8sshqa

  • MD5

    a7ccf98ab30ee4c14ef726389a5e7ee9

  • SHA1

    7cacf5d014126bc4d21201faa2bffe18829443f3

  • SHA256

    e834998ef2aec8715419073c4d6d350954c8d7bf5ad1110e57d273edb3a57bb9

  • SHA512

    031866bf49ec1c3acd850ef0701dafe1acfb854133670932e5b1ff1c5fb85f8ce4be359d3e8cec353f879dfcd790ea1e41898fceb4088e3e62019d5656aa64c3

  • SSDEEP

    393216:iQAqlTBDqIrYLTs1T6Gk8+hE5zEqSPDZTL3IQ/pr5ILAFL6OxCUQCETpRL9zHkfx:i3kB+IrYn26GkUzEP1/YQ/lRLbsZnpzg

Malware Config

Targets

    • Target

      a7ccf98ab30ee4c14ef726389a5e7ee9_JaffaCakes118

    • Size

      20.3MB

    • MD5

      a7ccf98ab30ee4c14ef726389a5e7ee9

    • SHA1

      7cacf5d014126bc4d21201faa2bffe18829443f3

    • SHA256

      e834998ef2aec8715419073c4d6d350954c8d7bf5ad1110e57d273edb3a57bb9

    • SHA512

      031866bf49ec1c3acd850ef0701dafe1acfb854133670932e5b1ff1c5fb85f8ce4be359d3e8cec353f879dfcd790ea1e41898fceb4088e3e62019d5656aa64c3

    • SSDEEP

      393216:iQAqlTBDqIrYLTs1T6Gk8+hE5zEqSPDZTL3IQ/pr5ILAFL6OxCUQCETpRL9zHkfx:i3kB+IrYn26GkUzEP1/YQ/lRLbsZnpzg

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks