General

  • Target

    dd0db0ce75403252027a639ae598b680_JaffaCakes118

  • Size

    11.1MB

  • Sample

    240912-zyvcssvcrj

  • MD5

    dd0db0ce75403252027a639ae598b680

  • SHA1

    b2575a4207f4a7136e4dfa6a7240034c7e691a31

  • SHA256

    c269aa40a08fca6cb7ce037019a96c286dfa0bd681171c31dd5e9334b2a74cdc

  • SHA512

    f3f8b821e71d4b44b63da9c0e520f9730c45c663165b55394a8ad57c450afeee72a145e92e8c3ba4ce914526cf6aaf1a6c3a18546c999672bc8a7465182092d5

  • SSDEEP

    196608:PHuX8PDhocnSUbRsKdz7hdz7nKDnDy8JEHGhIJEHGhMywk4SOnQmn8QEcJ3ba56w:vuXyFEQjzP8JWnJWnrfyXrMH4

Malware Config

Targets

    • Target

      dd0db0ce75403252027a639ae598b680_JaffaCakes118

    • Size

      11.1MB

    • MD5

      dd0db0ce75403252027a639ae598b680

    • SHA1

      b2575a4207f4a7136e4dfa6a7240034c7e691a31

    • SHA256

      c269aa40a08fca6cb7ce037019a96c286dfa0bd681171c31dd5e9334b2a74cdc

    • SHA512

      f3f8b821e71d4b44b63da9c0e520f9730c45c663165b55394a8ad57c450afeee72a145e92e8c3ba4ce914526cf6aaf1a6c3a18546c999672bc8a7465182092d5

    • SSDEEP

      196608:PHuX8PDhocnSUbRsKdz7hdz7nKDnDy8JEHGhIJEHGhMywk4SOnQmn8QEcJ3ba56w:vuXyFEQjzP8JWnJWnrfyXrMH4

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks