General

  • Target

    ff9bbfb77037ef588ed92c91a9272eda_JaffaCakes118

  • Size

    13.2MB

  • Sample

    240930-a45y2sshpa

  • MD5

    ff9bbfb77037ef588ed92c91a9272eda

  • SHA1

    55ce11377520fdf367c199c27b49eebb4b34857c

  • SHA256

    47e8203254fc6d7a562ef8fadd0055a020ad8c8e139166a95d6aa7721fb90806

  • SHA512

    1a6adca1cab1b7efc1a4969284de794529edb302b2844bdb908ce38d589eca72b1db2c99c077dc1ce9358556bc24f8088a9c4ac59ff87d828128b5c1d04d3c88

  • SSDEEP

    196608:+ujM0DJzcBTS3/eUpNt4sriXxcwtYw7svo1SU/7BzTXjK+vkjiUeSpxUXRI90aYq:+uncZw/LpjiXeIYwT1Z/2YPOn

Malware Config

Targets

    • Target

      ff9bbfb77037ef588ed92c91a9272eda_JaffaCakes118

    • Size

      13.2MB

    • MD5

      ff9bbfb77037ef588ed92c91a9272eda

    • SHA1

      55ce11377520fdf367c199c27b49eebb4b34857c

    • SHA256

      47e8203254fc6d7a562ef8fadd0055a020ad8c8e139166a95d6aa7721fb90806

    • SHA512

      1a6adca1cab1b7efc1a4969284de794529edb302b2844bdb908ce38d589eca72b1db2c99c077dc1ce9358556bc24f8088a9c4ac59ff87d828128b5c1d04d3c88

    • SSDEEP

      196608:+ujM0DJzcBTS3/eUpNt4sriXxcwtYw7svo1SU/7BzTXjK+vkjiUeSpxUXRI90aYq:+uncZw/LpjiXeIYwT1Z/2YPOn

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks