General

  • Target

    6322a7071af508402d8af2328fa9dc39_JaffaCakes118

  • Size

    7.8MB

  • Sample

    240722-n3rxpaxclm

  • MD5

    6322a7071af508402d8af2328fa9dc39

  • SHA1

    d8d13834e9e80af844cab24ec6b9999d79b9c24b

  • SHA256

    e43b95c83fcd25044bd61f2db80ad710163b8b47485b9dc8dd04eddeb0c51b34

  • SHA512

    0219adda9d8edf2de44086b8e951969d8a3bddd06a609f2fc24640bdd419a1d5a9eb66b4479d4a33e660feda1726b644fb2e32f178f3cba2bd0d5434bd199c81

  • SSDEEP

    196608:K9mQ/zT19SXhAgAJWCowpdQ5lkiZ4kGsJyGjY02IEjhj+lE:3QrBsxwJ8wpdQ5lkyfJyGkjhH

Malware Config

Targets

    • Target

      6322a7071af508402d8af2328fa9dc39_JaffaCakes118

    • Size

      7.8MB

    • MD5

      6322a7071af508402d8af2328fa9dc39

    • SHA1

      d8d13834e9e80af844cab24ec6b9999d79b9c24b

    • SHA256

      e43b95c83fcd25044bd61f2db80ad710163b8b47485b9dc8dd04eddeb0c51b34

    • SHA512

      0219adda9d8edf2de44086b8e951969d8a3bddd06a609f2fc24640bdd419a1d5a9eb66b4479d4a33e660feda1726b644fb2e32f178f3cba2bd0d5434bd199c81

    • SSDEEP

      196608:K9mQ/zT19SXhAgAJWCowpdQ5lkiZ4kGsJyGjY02IEjhj+lE:3QrBsxwJ8wpdQ5lkyfJyGkjhH

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks