General

  • Target

    e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118

  • Size

    16.0MB

  • Sample

    240918-x272ysyena

  • MD5

    e9d0a4e0f688aa575699b623c9cb655c

  • SHA1

    f4be88da5b2dfb0e5f81ee040dd18275e50d32e3

  • SHA256

    9c4fda293acbd460608ce4f46d75be94a008f44b21f2f47097cc411f905a9410

  • SHA512

    0577701dcbc6ab093249a6da8522543e883bbd9195af2a0e88ce9a448d5dce40a570615129ddff4ce97b39bb9b511c10a99e7932b031ca68f20c9aab5fa8cbb5

  • SSDEEP

    393216:8KmqaLPoP/2GMWfRBfmut2xK6i+cNUWQI12:8OajoPXauwtieu12

Malware Config

Targets

    • Target

      e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118

    • Size

      16.0MB

    • MD5

      e9d0a4e0f688aa575699b623c9cb655c

    • SHA1

      f4be88da5b2dfb0e5f81ee040dd18275e50d32e3

    • SHA256

      9c4fda293acbd460608ce4f46d75be94a008f44b21f2f47097cc411f905a9410

    • SHA512

      0577701dcbc6ab093249a6da8522543e883bbd9195af2a0e88ce9a448d5dce40a570615129ddff4ce97b39bb9b511c10a99e7932b031ca68f20c9aab5fa8cbb5

    • SSDEEP

      393216:8KmqaLPoP/2GMWfRBfmut2xK6i+cNUWQI12:8OajoPXauwtieu12

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks