General

  • Target

    ea86c7f3bd6d4d9c878bf848a09cfd85_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240919-ebsv8szakf

  • MD5

    ea86c7f3bd6d4d9c878bf848a09cfd85

  • SHA1

    d4ad4a39c7faf352c150793ca3c4b9fa3d8ae592

  • SHA256

    e6408161a5c7f5c3eefa7d73816ba919f4343088242bcc4a5805f8be5d3754c7

  • SHA512

    68c69ce361b69a1865566ca715cb368f1addc88a718423d4ad7524301081b69599d5d7d15a8c0b1bfa1002c8915647d3c6de85bef4a43ced63cdae2dd807a783

  • SSDEEP

    98304:/AX0qKeSA8xqWs8c6zU4xKJVoBsF/o3xjv6/ZrPWpBoNSy03V63ycUPJWImtAY:/FqKjA88WXrKVfF/ohjv0PkL3V63gJTK

Malware Config

Targets

    • Target

      ea86c7f3bd6d4d9c878bf848a09cfd85_JaffaCakes118

    • Size

      5.4MB

    • MD5

      ea86c7f3bd6d4d9c878bf848a09cfd85

    • SHA1

      d4ad4a39c7faf352c150793ca3c4b9fa3d8ae592

    • SHA256

      e6408161a5c7f5c3eefa7d73816ba919f4343088242bcc4a5805f8be5d3754c7

    • SHA512

      68c69ce361b69a1865566ca715cb368f1addc88a718423d4ad7524301081b69599d5d7d15a8c0b1bfa1002c8915647d3c6de85bef4a43ced63cdae2dd807a783

    • SSDEEP

      98304:/AX0qKeSA8xqWs8c6zU4xKJVoBsF/o3xjv6/ZrPWpBoNSy03V63ycUPJWImtAY:/FqKjA88WXrKVfF/ohjv0PkL3V63gJTK

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks