General

  • Target

    cff14b8a790123db7bdb09cfa4bf4e58_JaffaCakes118

  • Size

    27.6MB

  • Sample

    240906-tqhq5swfkg

  • MD5

    cff14b8a790123db7bdb09cfa4bf4e58

  • SHA1

    c29897330559be60805449252238c78d67b8fc82

  • SHA256

    fca0417c53b2a041c9d3350b101b36b6279a45f2fdd23c28b554e4416dd30762

  • SHA512

    24a27e1109f42cc33e82e0f314c7d4ddaf2500b6e7261073257586ae3ef3c29d38988deb78308d8e6126c2a5092de653a30b1555c16c6bfedb9bdd499ff97983

  • SSDEEP

    786432:Z343ffB1C0p6M/6togGtfXOXo13l2zKt5CStz:Zo3xY0QM/6togoXOY/nia

Malware Config

Targets

    • Target

      cff14b8a790123db7bdb09cfa4bf4e58_JaffaCakes118

    • Size

      27.6MB

    • MD5

      cff14b8a790123db7bdb09cfa4bf4e58

    • SHA1

      c29897330559be60805449252238c78d67b8fc82

    • SHA256

      fca0417c53b2a041c9d3350b101b36b6279a45f2fdd23c28b554e4416dd30762

    • SHA512

      24a27e1109f42cc33e82e0f314c7d4ddaf2500b6e7261073257586ae3ef3c29d38988deb78308d8e6126c2a5092de653a30b1555c16c6bfedb9bdd499ff97983

    • SSDEEP

      786432:Z343ffB1C0p6M/6togGtfXOXo13l2zKt5CStz:Zo3xY0QM/6togoXOY/nia

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks