General

  • Target

    8c5eac60c7b7061155fc973c02099b36_JaffaCakes118

  • Size

    4.8MB

  • Sample

    240811-28wpqayane

  • MD5

    8c5eac60c7b7061155fc973c02099b36

  • SHA1

    17627413dad62e42718dc0befc17ec0f6c1e798a

  • SHA256

    6ef478768891da54c12a136616f53cbdc70d93ed15afc231d75dc336fb837302

  • SHA512

    2e8ded7043e2c1a72858b21811fb33761760547e350cbbb92903f8aab21719e422dfea5f59fa15555e813558df4612cd6c5c1606f5724896ada6783d1d05ff12

  • SSDEEP

    98304:gRiUaqXnX0eKl2/VUlfkP8xTqMqRzI1x9v/v2ai38Ydge7axEFW1BVG:gkqJilTUzIh/ef7geKB1i

Malware Config

Targets

    • Target

      8c5eac60c7b7061155fc973c02099b36_JaffaCakes118

    • Size

      4.8MB

    • MD5

      8c5eac60c7b7061155fc973c02099b36

    • SHA1

      17627413dad62e42718dc0befc17ec0f6c1e798a

    • SHA256

      6ef478768891da54c12a136616f53cbdc70d93ed15afc231d75dc336fb837302

    • SHA512

      2e8ded7043e2c1a72858b21811fb33761760547e350cbbb92903f8aab21719e422dfea5f59fa15555e813558df4612cd6c5c1606f5724896ada6783d1d05ff12

    • SSDEEP

      98304:gRiUaqXnX0eKl2/VUlfkP8xTqMqRzI1x9v/v2ai38Ydge7axEFW1BVG:gkqJilTUzIh/ef7geKB1i

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks