General

  • Target

    e0862abc2b831631b4410a936489efe3_JaffaCakes118

  • Size

    9.1MB

  • Sample

    240914-td7jqssfnb

  • MD5

    e0862abc2b831631b4410a936489efe3

  • SHA1

    53f93c23865da235863e2714140154149181f7ad

  • SHA256

    09136b0ca18c8d4853e8801a3091d7055d22e2d87db0c58d51da0f10aa2a72b9

  • SHA512

    bec7fcf8368b5073f632263a77bc7942732aa016299f7a81aac1c19dc15eb5c04df983faf5acd181e3357355e4ceeed80eeb2cfbc541f6fcd57b25f159ec2eb8

  • SSDEEP

    196608:ZaG2jvX2etAWIsxBj2xxxQLAd2RkCvMOkDGxJxbxIxHxYxExXxZx6x3o7q:xe2e2WI+SnQEkRkCvMEP9yRCmhfw3P

Malware Config

Targets

    • Target

      e0862abc2b831631b4410a936489efe3_JaffaCakes118

    • Size

      9.1MB

    • MD5

      e0862abc2b831631b4410a936489efe3

    • SHA1

      53f93c23865da235863e2714140154149181f7ad

    • SHA256

      09136b0ca18c8d4853e8801a3091d7055d22e2d87db0c58d51da0f10aa2a72b9

    • SHA512

      bec7fcf8368b5073f632263a77bc7942732aa016299f7a81aac1c19dc15eb5c04df983faf5acd181e3357355e4ceeed80eeb2cfbc541f6fcd57b25f159ec2eb8

    • SSDEEP

      196608:ZaG2jvX2etAWIsxBj2xxxQLAd2RkCvMOkDGxJxbxIxHxYxExXxZx6x3o7q:xe2e2WI+SnQEkRkCvMEP9yRCmhfw3P

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks