General

  • Target

    8610a811f39938f9d3c9a8b8eb544266_JaffaCakes118

  • Size

    4.9MB

  • Sample

    240810-pq7ytazalq

  • MD5

    8610a811f39938f9d3c9a8b8eb544266

  • SHA1

    74c82cdaa2ff35705fa930ad0334b63f18fbe795

  • SHA256

    30d80502a00a67dd2428a13988253804370a86e294a35121233501b96c56abf3

  • SHA512

    880ade7778d29039e790bfe1055d2961bd82277f752a2a5f1e0110f8b3e79300c669e1bc922fcdbb97ce1c1228a76abcd89d8e8c86f893fadd5112a3c48b7621

  • SSDEEP

    98304:dpry0iAcceXsdxbx35K8TUW6hYWsjthPYkdSgSzD/0JPMskPPSJAdrs7bzFXyhyE:G0izc/Lbx3oYmhY/jbPxdSdUJ1kPaJAt

Malware Config

Targets

    • Target

      8610a811f39938f9d3c9a8b8eb544266_JaffaCakes118

    • Size

      4.9MB

    • MD5

      8610a811f39938f9d3c9a8b8eb544266

    • SHA1

      74c82cdaa2ff35705fa930ad0334b63f18fbe795

    • SHA256

      30d80502a00a67dd2428a13988253804370a86e294a35121233501b96c56abf3

    • SHA512

      880ade7778d29039e790bfe1055d2961bd82277f752a2a5f1e0110f8b3e79300c669e1bc922fcdbb97ce1c1228a76abcd89d8e8c86f893fadd5112a3c48b7621

    • SSDEEP

      98304:dpry0iAcceXsdxbx35K8TUW6hYWsjthPYkdSgSzD/0JPMskPPSJAdrs7bzFXyhyE:G0izc/Lbx3oYmhY/jbPxdSdUJ1kPaJAt

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks