General

  • Target

    b49210bc8de3ac1f869a4ef9afaa4c4e_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240616-w4tfxasapf

  • MD5

    b49210bc8de3ac1f869a4ef9afaa4c4e

  • SHA1

    4cf47b6991a8d85d17b09c3cbc2cc20c0abec9ef

  • SHA256

    129d713dacc3e022af75be408f5d5b04716b82e9900a1775145f8b232480fd79

  • SHA512

    2966c5c90c70c0cdb5e4ab4fc0a997c6959250b47256a587d549a2e5be121f9293f43198ed0f6cea5dc7dd72401da3d6b3be239334edca3e4ccd18be0d7c5977

  • SSDEEP

    98304:y47XfXmLs4OvdFSzAzAFvjUrKg4/KsIQr5nIXN7Zs84enU3lxpbqFKBB:v7/SQvdokzejUrKg4/Ki9nIXffu3hqFq

Malware Config

Targets

    • Target

      b49210bc8de3ac1f869a4ef9afaa4c4e_JaffaCakes118

    • Size

      4.1MB

    • MD5

      b49210bc8de3ac1f869a4ef9afaa4c4e

    • SHA1

      4cf47b6991a8d85d17b09c3cbc2cc20c0abec9ef

    • SHA256

      129d713dacc3e022af75be408f5d5b04716b82e9900a1775145f8b232480fd79

    • SHA512

      2966c5c90c70c0cdb5e4ab4fc0a997c6959250b47256a587d549a2e5be121f9293f43198ed0f6cea5dc7dd72401da3d6b3be239334edca3e4ccd18be0d7c5977

    • SSDEEP

      98304:y47XfXmLs4OvdFSzAzAFvjUrKg4/KsIQr5nIXN7Zs84enU3lxpbqFKBB:v7/SQvdokzejUrKg4/Ki9nIXffu3hqFq

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks