General

  • Target

    c079b6b166be1a465fd4099bc2ad72cc_JaffaCakes118

  • Size

    29.7MB

  • Sample

    240825-ltl9qsxfpc

  • MD5

    c079b6b166be1a465fd4099bc2ad72cc

  • SHA1

    64f33271477acf3b04af2ec864437501a299ec04

  • SHA256

    24336de93cd0981ff85793a27035650d778391f50bb5622140c35eceba9b4c8d

  • SHA512

    0e94c90abc675824f28b76fc7fe599f2e2b0751b3571b916c791f33b8ee6a49d14d2a34f1a777f023681330c887866698031a3f59a5b66998bc766154152d941

  • SSDEEP

    786432:ipuk+uieiE7212EXx1trQrA4c7cbBXoSBIYU9ug:0utuieb2QEB1trQlcMBIY0

Malware Config

Targets

    • Target

      c079b6b166be1a465fd4099bc2ad72cc_JaffaCakes118

    • Size

      29.7MB

    • MD5

      c079b6b166be1a465fd4099bc2ad72cc

    • SHA1

      64f33271477acf3b04af2ec864437501a299ec04

    • SHA256

      24336de93cd0981ff85793a27035650d778391f50bb5622140c35eceba9b4c8d

    • SHA512

      0e94c90abc675824f28b76fc7fe599f2e2b0751b3571b916c791f33b8ee6a49d14d2a34f1a777f023681330c887866698031a3f59a5b66998bc766154152d941

    • SSDEEP

      786432:ipuk+uieiE7212EXx1trQrA4c7cbBXoSBIYU9ug:0utuieb2QEB1trQlcMBIY0

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks