General

  • Target

    fc2b81f8eb283eefcf65698f4075216c_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240928-m7qprasdnr

  • MD5

    fc2b81f8eb283eefcf65698f4075216c

  • SHA1

    54c21c07609e061b1db9a3605ab41975c201db17

  • SHA256

    f80d2f4f1e6cc6428720bb27a003fe01d1162b27bdd0124c53817c1797b43c5d

  • SHA512

    4b8f078df57dd8a219e64d95d389a00502d2ea16a2ce00629a4f4c275edc53f207aba2709fb345a2940916221062630c933649bb7a6311cd79aba275704673ff

  • SSDEEP

    786432:vzZZ3cKvdVD+G3QlP5pqL8HFmzkvRLcyLgO4m6B1uhoLR0IxY2BN:rhv+G3QlxpqjzgLgG6BQh6RfxY2BN

Malware Config

Targets

    • Target

      fc2b81f8eb283eefcf65698f4075216c_JaffaCakes118

    • Size

      31.8MB

    • MD5

      fc2b81f8eb283eefcf65698f4075216c

    • SHA1

      54c21c07609e061b1db9a3605ab41975c201db17

    • SHA256

      f80d2f4f1e6cc6428720bb27a003fe01d1162b27bdd0124c53817c1797b43c5d

    • SHA512

      4b8f078df57dd8a219e64d95d389a00502d2ea16a2ce00629a4f4c275edc53f207aba2709fb345a2940916221062630c933649bb7a6311cd79aba275704673ff

    • SSDEEP

      786432:vzZZ3cKvdVD+G3QlP5pqL8HFmzkvRLcyLgO4m6B1uhoLR0IxY2BN:rhv+G3QlxpqjzgLgG6BQh6RfxY2BN

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks