General

  • Target

    255227789677175eac149c19fb0b17ca_JaffaCakes118

  • Size

    7.2MB

  • Sample

    241008-zqjakavhrp

  • MD5

    255227789677175eac149c19fb0b17ca

  • SHA1

    85e6d876c01fa58d0eafd4831706fb6c60f5f0e7

  • SHA256

    17268cb4955620a90512b5d980063620e82f9a715cabe2557dc1b2b062d4ea77

  • SHA512

    c202842199d1590e508e425a2300859a0ad56a75ebb86834b1e0533cfc08661338fd29383c20b9dcde6152a27d2cdc4e28adb21c4f11bb4f0eb3d05bf992ebbc

  • SSDEEP

    196608:/4mBmFXSUkYvz6wIj3WJEdGLpoi9K25l9a49cm7/H8yTh3pL:/XUkYvz6kuG9nHadm7kQBpL

Malware Config

Targets

    • Target

      255227789677175eac149c19fb0b17ca_JaffaCakes118

    • Size

      7.2MB

    • MD5

      255227789677175eac149c19fb0b17ca

    • SHA1

      85e6d876c01fa58d0eafd4831706fb6c60f5f0e7

    • SHA256

      17268cb4955620a90512b5d980063620e82f9a715cabe2557dc1b2b062d4ea77

    • SHA512

      c202842199d1590e508e425a2300859a0ad56a75ebb86834b1e0533cfc08661338fd29383c20b9dcde6152a27d2cdc4e28adb21c4f11bb4f0eb3d05bf992ebbc

    • SSDEEP

      196608:/4mBmFXSUkYvz6wIj3WJEdGLpoi9K25l9a49cm7/H8yTh3pL:/XUkYvz6kuG9nHadm7kQBpL

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks