General

  • Target

    b4503c974ee85db8a28045b1be712891_JaffaCakes118

  • Size

    9.9MB

  • Sample

    240616-s9mzjatbnj

  • MD5

    b4503c974ee85db8a28045b1be712891

  • SHA1

    3ef0c026f0e3f8055838ab7fa987180a8aad43f4

  • SHA256

    30aae53266bc189c83321674a29e9d0ab9b971e82dfb035b97e580785404591f

  • SHA512

    fbe933361a76cdc99b9845a7fb0c3cc1f5c136251274fa958fa68fe9317a48283356b7088de068fc220f9b3a42a29cda3b851ec4ab4e1e384ed7f8dfd15b1d7c

  • SSDEEP

    196608:TRRz4L5vq8Iog8DYkSKMZsf5wLCcZRppdCn8pzUD+1RU8PKavUd5YoVi:TTULpotk2sfmmSbdKaYDoXNUTYoc

Malware Config

Targets

    • Target

      b4503c974ee85db8a28045b1be712891_JaffaCakes118

    • Size

      9.9MB

    • MD5

      b4503c974ee85db8a28045b1be712891

    • SHA1

      3ef0c026f0e3f8055838ab7fa987180a8aad43f4

    • SHA256

      30aae53266bc189c83321674a29e9d0ab9b971e82dfb035b97e580785404591f

    • SHA512

      fbe933361a76cdc99b9845a7fb0c3cc1f5c136251274fa958fa68fe9317a48283356b7088de068fc220f9b3a42a29cda3b851ec4ab4e1e384ed7f8dfd15b1d7c

    • SSDEEP

      196608:TRRz4L5vq8Iog8DYkSKMZsf5wLCcZRppdCn8pzUD+1RU8PKavUd5YoVi:TTULpotk2sfmmSbdKaYDoXNUTYoc

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks