General

  • Target

    c7a45a4338b1684d56c484c109ee3a91_JaffaCakes118

  • Size

    28.3MB

  • Sample

    240828-zs186awbng

  • MD5

    c7a45a4338b1684d56c484c109ee3a91

  • SHA1

    419486ed595c6277887331e3364814c4ae195b4b

  • SHA256

    8abe3611ae5f25bbc5ada12b4374605975f1cbba9b9c6a29aa3d247c882141d0

  • SHA512

    fbb6a0f9cd338daaa1273b5eb861da27ef6c364a7fa8a8a79dc958a39d92b154e7bbf4508aef40a4bddb6a43cdcefff8cb8a345b176928f07cec96b1f104fbcf

  • SSDEEP

    786432:4d9MDlg3lYA57FTtB66eH1dBuniXZ/W+YSy3lwJhu:4Ig3ZTB9eHPn/WFb3lwq

Malware Config

Targets

    • Target

      c7a45a4338b1684d56c484c109ee3a91_JaffaCakes118

    • Size

      28.3MB

    • MD5

      c7a45a4338b1684d56c484c109ee3a91

    • SHA1

      419486ed595c6277887331e3364814c4ae195b4b

    • SHA256

      8abe3611ae5f25bbc5ada12b4374605975f1cbba9b9c6a29aa3d247c882141d0

    • SHA512

      fbb6a0f9cd338daaa1273b5eb861da27ef6c364a7fa8a8a79dc958a39d92b154e7bbf4508aef40a4bddb6a43cdcefff8cb8a345b176928f07cec96b1f104fbcf

    • SSDEEP

      786432:4d9MDlg3lYA57FTtB66eH1dBuniXZ/W+YSy3lwJhu:4Ig3ZTB9eHPn/WFb3lwq

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks