General

  • Target

    b7182b51e694d7c2a772eb8f380a1a55_JaffaCakes118

  • Size

    20.1MB

  • Sample

    240617-gqzy7s1fpl

  • MD5

    b7182b51e694d7c2a772eb8f380a1a55

  • SHA1

    df3282546aeea121c8623d828d4da517bf23994f

  • SHA256

    e3554d4c544974d09a14dedc6889628b14eda0da8353c31308d838e0aa690044

  • SHA512

    641646f15b7bc0b40bfad5c47f56f100bdd4d888531990ce410f0b667f3f44f5100bd77f93562dc032445231390ec7df333a49b438302ceb1d8cd30a99447a17

  • SSDEEP

    393216:PKY7xNdacM8TqqK4SZl8NS9W4W+MtVSQIuMZ2/LjMjibObXwqAJu:zM8WH56KW4Wn6kMj1TE0

Malware Config

Targets

    • Target

      b7182b51e694d7c2a772eb8f380a1a55_JaffaCakes118

    • Size

      20.1MB

    • MD5

      b7182b51e694d7c2a772eb8f380a1a55

    • SHA1

      df3282546aeea121c8623d828d4da517bf23994f

    • SHA256

      e3554d4c544974d09a14dedc6889628b14eda0da8353c31308d838e0aa690044

    • SHA512

      641646f15b7bc0b40bfad5c47f56f100bdd4d888531990ce410f0b667f3f44f5100bd77f93562dc032445231390ec7df333a49b438302ceb1d8cd30a99447a17

    • SSDEEP

      393216:PKY7xNdacM8TqqK4SZl8NS9W4W+MtVSQIuMZ2/LjMjibObXwqAJu:zM8WH56KW4Wn6kMj1TE0

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks