General

  • Target

    aaed79c25b704d39d29a4b622e0e9800_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240614-v4nd8atenq

  • MD5

    aaed79c25b704d39d29a4b622e0e9800

  • SHA1

    1b15db19332d6cc281198ca55da77270fd89e1c3

  • SHA256

    4c108dc8ae8e02719e1d0844ae77d820fd91cb97c48cac5363a069aa3249d192

  • SHA512

    57984a9acbbd427c1e90dc2613093236ab09e9397a79aa910d5b84d9e052df2f4a2852312c60e4c728b4b6628349c1c53d0ccb9dd56e0826e63f15994604db8c

  • SSDEEP

    196608:qV27+Ps5frJ+XF7C+5YcomPctss9MuEyARMQwkYIPeaosbYAEPkCXjPIo2:q65fr817V8m0kuENMQwkfbYAMkCXjPIn

Malware Config

Targets

    • Target

      aaed79c25b704d39d29a4b622e0e9800_JaffaCakes118

    • Size

      11.4MB

    • MD5

      aaed79c25b704d39d29a4b622e0e9800

    • SHA1

      1b15db19332d6cc281198ca55da77270fd89e1c3

    • SHA256

      4c108dc8ae8e02719e1d0844ae77d820fd91cb97c48cac5363a069aa3249d192

    • SHA512

      57984a9acbbd427c1e90dc2613093236ab09e9397a79aa910d5b84d9e052df2f4a2852312c60e4c728b4b6628349c1c53d0ccb9dd56e0826e63f15994604db8c

    • SSDEEP

      196608:qV27+Ps5frJ+XF7C+5YcomPctss9MuEyARMQwkYIPeaosbYAEPkCXjPIo2:q65fr817V8m0kuENMQwkfbYAMkCXjPIn

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks