General

  • Target

    fa6a3e0969381b028759b55f3c6e7d29_JaffaCakes118

  • Size

    14.7MB

  • Sample

    240927-pre97asfqm

  • MD5

    fa6a3e0969381b028759b55f3c6e7d29

  • SHA1

    bd89ff2531d5ff05ba9863a0f9d05f50f1b1a7da

  • SHA256

    e8b4510fff45c29e3452bba0bb9067a62455df16d61bcf5ae91903ee00be931a

  • SHA512

    e8db1f3f1f79b688e716a92688ae60bdbffd69f99cce341d9bc47c34ba36372d4312f0e4edb60df4b2eb7c7682aae2494bb8d17b62f6cbea6e587238ef68b0fa

  • SSDEEP

    393216:JlFc3Fc/Fc5Fc6Fc5FcNFc9FjciRZDQkIFmAhvrwC9P+FURTE21ki9th5EULNH:JEwW3qm+ZaJDrxd1Nki9thh9

Malware Config

Targets

    • Target

      fa6a3e0969381b028759b55f3c6e7d29_JaffaCakes118

    • Size

      14.7MB

    • MD5

      fa6a3e0969381b028759b55f3c6e7d29

    • SHA1

      bd89ff2531d5ff05ba9863a0f9d05f50f1b1a7da

    • SHA256

      e8b4510fff45c29e3452bba0bb9067a62455df16d61bcf5ae91903ee00be931a

    • SHA512

      e8db1f3f1f79b688e716a92688ae60bdbffd69f99cce341d9bc47c34ba36372d4312f0e4edb60df4b2eb7c7682aae2494bb8d17b62f6cbea6e587238ef68b0fa

    • SSDEEP

      393216:JlFc3Fc/Fc5Fc6Fc5FcNFc9FjciRZDQkIFmAhvrwC9P+FURTE21ki9th5EULNH:JEwW3qm+ZaJDrxd1Nki9thh9

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks