General

  • Target

    d1c7bb3311054f642e957d008261e945_JaffaCakes118

  • Size

    1.9MB

  • MD5

    d1c7bb3311054f642e957d008261e945

  • SHA1

    4ecef2d3cb10819073256cf7ee184c44805dfffb

  • SHA256

    119a6226c5db8a6619aef28d403c26452c83254a8f529c535e6d1c84ddc50aeb

  • SHA512

    39bbf33724774ad38b46d7fa5f6d829b77b84d8eb860d35b8da50cbf7f0aff50cd8aea7d3666ffa093af09bab433d5b6093e82625d4fedf64f92f074aff10236

  • SSDEEP

    49152:Zu5QJ0DZEKwuAyy4phaB1Q9MECqP2vcUISNQ4w/mpH:Zu/DZ2uAyzphaB1QSECquvcUIUQ4w/mt

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • d1c7bb3311054f642e957d008261e945_JaffaCakes118
    .zip
  • TPSparkyRoot/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • TPSparkyRoot/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • TPSparkyRoot/RootExplorer.apk
    .apk android

    com.speedsoftware.rootexplorer

    .RootExplorer


  • TPSparkyRoot/Superuser.apk
    .apk android

    com.noshufou.android.su

    HomeActivity


  • TPSparkyRoot/TPSparkyRoot.bat
  • TPSparkyRoot/adb.exe
    .exe windows:4 windows x86 arch:x86

    39f5cbfe41ec1c7dd9d1a61792bd4add


    Headers

    Imports

    Sections

  • TPSparkyRoot/busybox
    .elf linux arm
  • TPSparkyRoot/su
    .elf linux arm
  • TPSparkyRoot/԰.txt
  • TPSparkyRoot/԰.url