General

  • Target

    b2a3cf1dbb5698c208ee2c0a30e6058f_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240821-jlcdfsxang

  • MD5

    b2a3cf1dbb5698c208ee2c0a30e6058f

  • SHA1

    dd9e9107c4aa9643b59253a17a1c8bd158d81e4c

  • SHA256

    1c107ce354d880cb9466eb9018854277da2c79f88bd7592ae409939cb17c28e3

  • SHA512

    f060edc69ecca4d62a282a99d187498895f324982c7e489fe09104b8759cbdc178a10211ff887e7000e2d8897007069b5c752ea3989ab800cc08221807483a07

  • SSDEEP

    98304:3iK4Y/d/eeKSz/JTG2eRpEyoEc2c737hXwp3a+MGz6eCSWeOBHME8dzlYJKEYCWt:3+0pDJ/c2ovoR3xrUzTJO6qNYCvXKa5K

Malware Config

Targets

    • Target

      b2a3cf1dbb5698c208ee2c0a30e6058f_JaffaCakes118

    • Size

      5.9MB

    • MD5

      b2a3cf1dbb5698c208ee2c0a30e6058f

    • SHA1

      dd9e9107c4aa9643b59253a17a1c8bd158d81e4c

    • SHA256

      1c107ce354d880cb9466eb9018854277da2c79f88bd7592ae409939cb17c28e3

    • SHA512

      f060edc69ecca4d62a282a99d187498895f324982c7e489fe09104b8759cbdc178a10211ff887e7000e2d8897007069b5c752ea3989ab800cc08221807483a07

    • SSDEEP

      98304:3iK4Y/d/eeKSz/JTG2eRpEyoEc2c737hXwp3a+MGz6eCSWeOBHME8dzlYJKEYCWt:3+0pDJ/c2ovoR3xrUzTJO6qNYCvXKa5K

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks