General

  • Target

    e0784c6cda741613f13fcd47273f17ba_JaffaCakes118

  • Size

    12.5MB

  • Sample

    240914-ss47gs1fjg

  • MD5

    e0784c6cda741613f13fcd47273f17ba

  • SHA1

    cd47c1e6cf25dd030d52f8fb0a3034eb220feb8c

  • SHA256

    4d3f473c865461577b0aa04574d40a3f013027e6fcb4020404ffca4eb733f7b0

  • SHA512

    709cd234bbf6c0fce19dff6fcfdf1a823c2e5850422537197384253a82458b120ccf884398512092c6c95517bc45dac85895a752b858f90b0bd97759e75c76c7

  • SSDEEP

    393216:9tBA83FiiLiEcuRemMAzmAwbS85cZo5e/dq8pVoQmEqpxC62bt:ne8MqcVmsA385cD/dq4WQsC62R

Malware Config

Targets

    • Target

      e0784c6cda741613f13fcd47273f17ba_JaffaCakes118

    • Size

      12.5MB

    • MD5

      e0784c6cda741613f13fcd47273f17ba

    • SHA1

      cd47c1e6cf25dd030d52f8fb0a3034eb220feb8c

    • SHA256

      4d3f473c865461577b0aa04574d40a3f013027e6fcb4020404ffca4eb733f7b0

    • SHA512

      709cd234bbf6c0fce19dff6fcfdf1a823c2e5850422537197384253a82458b120ccf884398512092c6c95517bc45dac85895a752b858f90b0bd97759e75c76c7

    • SSDEEP

      393216:9tBA83FiiLiEcuRemMAzmAwbS85cZo5e/dq8pVoQmEqpxC62bt:ne8MqcVmsA385cD/dq4WQsC62R

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks