General

  • Target

    54c3bf485ac8eb7f1ecb878087d079f7_JaffaCakes118

  • Size

    1.7MB

  • Sample

    241018-b2dmfs1hlk

  • MD5

    54c3bf485ac8eb7f1ecb878087d079f7

  • SHA1

    4aa4af2f381fd759e645e39766604299aff26539

  • SHA256

    debc54302524272f9a7dae8ed48e5c2f2966f7f8586f3c85a1fcacf34eeb838b

  • SHA512

    67717afb59ba39b5e0e0853b32c5552c43bcf4092297c7fe5a0322fc8de13a834431912c7b44071d09794b83283a6fd0a88be13ac73e0b596aea0030e3079c37

  • SSDEEP

    49152:5d9XUGrU1tI9sBMRRxEvSdZdTwZTaW9IE5Y/e4G/PPquQ:P941tI9sBMTxE2Zd6x9X50mPS5

Malware Config

Targets

    • Target

      54c3bf485ac8eb7f1ecb878087d079f7_JaffaCakes118

    • Size

      1.7MB

    • MD5

      54c3bf485ac8eb7f1ecb878087d079f7

    • SHA1

      4aa4af2f381fd759e645e39766604299aff26539

    • SHA256

      debc54302524272f9a7dae8ed48e5c2f2966f7f8586f3c85a1fcacf34eeb838b

    • SHA512

      67717afb59ba39b5e0e0853b32c5552c43bcf4092297c7fe5a0322fc8de13a834431912c7b44071d09794b83283a6fd0a88be13ac73e0b596aea0030e3079c37

    • SSDEEP

      49152:5d9XUGrU1tI9sBMRRxEvSdZdTwZTaW9IE5Y/e4G/PPquQ:P941tI9sBMTxE2Zd6x9X50mPS5

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks