General

  • Target

    ebb9333871a375107a7e4a1a5287278c_JaffaCakes118

  • Size

    23.7MB

  • Sample

    240919-tvha6sxhrd

  • MD5

    ebb9333871a375107a7e4a1a5287278c

  • SHA1

    59d8824b2fb07c3d1d4aa18ba9c7fedd4ea9393f

  • SHA256

    db8ac968145f2a5298ca2482d5a494d5ecf6b756f06a82bbde5c64436d8744ee

  • SHA512

    63fcafc26c6264826bfe7f13f63f1500af18500ae53236179182ef47480acc449629e50155d1101f9689266c20dc618d9fd2321a7b7ab9c8b638c244956b7793

  • SSDEEP

    393216:AUiNMnloScQdy6m8dAVlbTS61ghaCIMaTfG2QThTrvqJD535OsSOWpUQa1MuI/TE:AUiNMnloScQdy5FP71IzwfGP9Ed34sSO

Malware Config

Targets

    • Target

      ebb9333871a375107a7e4a1a5287278c_JaffaCakes118

    • Size

      23.7MB

    • MD5

      ebb9333871a375107a7e4a1a5287278c

    • SHA1

      59d8824b2fb07c3d1d4aa18ba9c7fedd4ea9393f

    • SHA256

      db8ac968145f2a5298ca2482d5a494d5ecf6b756f06a82bbde5c64436d8744ee

    • SHA512

      63fcafc26c6264826bfe7f13f63f1500af18500ae53236179182ef47480acc449629e50155d1101f9689266c20dc618d9fd2321a7b7ab9c8b638c244956b7793

    • SSDEEP

      393216:AUiNMnloScQdy6m8dAVlbTS61ghaCIMaTfG2QThTrvqJD535OsSOWpUQa1MuI/TE:AUiNMnloScQdy5FP71IzwfGP9Ed34sSO

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks