General

  • Target

    c271a09bda9c4338074bdd3dd7472d2f_JaffaCakes118

  • Size

    8.8MB

  • Sample

    240826-g35efs1cpl

  • MD5

    c271a09bda9c4338074bdd3dd7472d2f

  • SHA1

    378ec90265e3d382021c8e667bbd3667f7f01cd1

  • SHA256

    ac4c60812da771db28d4e2cbcd1bb295753bcb54e32ba6982af27b7db9d5552b

  • SHA512

    c0c5d3cb83b6872b249c1fccec41c28c64630eda82ce30ad6dd28bdd6a332554c77bcaa5e80488ff2ed7b0456527d8a335ddf2cbea8e8ab9c42c56a84b4c243d

  • SSDEEP

    196608:1kaMBqy50B2TRu4atY0+DnMdfcwbM/nMkfSbSvti:1kbsy5G2THaEMeBfMxL

Malware Config

Targets

    • Target

      c271a09bda9c4338074bdd3dd7472d2f_JaffaCakes118

    • Size

      8.8MB

    • MD5

      c271a09bda9c4338074bdd3dd7472d2f

    • SHA1

      378ec90265e3d382021c8e667bbd3667f7f01cd1

    • SHA256

      ac4c60812da771db28d4e2cbcd1bb295753bcb54e32ba6982af27b7db9d5552b

    • SHA512

      c0c5d3cb83b6872b249c1fccec41c28c64630eda82ce30ad6dd28bdd6a332554c77bcaa5e80488ff2ed7b0456527d8a335ddf2cbea8e8ab9c42c56a84b4c243d

    • SSDEEP

      196608:1kaMBqy50B2TRu4atY0+DnMdfcwbM/nMkfSbSvti:1kbsy5G2THaEMeBfMxL

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks