General

  • Target

    b425e2b70792d82a30806942b0dad186_JaffaCakes118

  • Size

    1.5MB

  • MD5

    b425e2b70792d82a30806942b0dad186

  • SHA1

    e5e24185b3637d39a8a803918a8559315352efab

  • SHA256

    e064e5d768cad7b82f8b003e8a56b9c69430a686a0ece31dd5725460ffa34743

  • SHA512

    730e804d835cc200149b5bae5bdc9a37acc2250dfef9230e851a14092b6e44b425402ee9ed1ed1f78739f21ebcdce9e06cadf5279ffe06c4d79a61f99f388614

  • SSDEEP

    24576:Qi8E7FRxUPlt7JLC5SEwmK65AoWAcH6U4DGY4c89HE6obtaejw94b76I:2EOdLMSEztA4cH6zGhc8+6ctBw9cX

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • b425e2b70792d82a30806942b0dad186_JaffaCakes118
    .zip
  • root/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • root/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • root/NetworkLocation.apk
    .apk android

    com.google.android.location

    ConfirmAlertActivity


  • root/Superuser.apk
    .apk android

    com.noshufou.android.su

    Su


  • root/adb.exe
    .exe windows:4 windows x86 arch:x86

    a76314a1de551ff40a8189637efb37ea


    Headers

    Imports

    Sections

  • root/busybox
    .elf linux arm
  • root/rageagainstthecage-arm5.bin
    .elf linux arm
  • root/root.bat
  • root/su
    .elf linux arm
  • root/unroot.bat