General

  • Target

    1bc74ca2fcce354183abe5ad8d882609_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240701-vfxyrashpk

  • MD5

    1bc74ca2fcce354183abe5ad8d882609

  • SHA1

    d9e7249b76af1b4f813e784bea481d46ae646611

  • SHA256

    3e37614a1da99a7565fd06dca1a6cfbd3f3455e773179e5bf8a32c2afdaf3374

  • SHA512

    5b79fd0781eec0fdec567a57060b90e9a71d1332b6c6b184796eb58ffcecef2e9751910511c50c166d17f2e5d10784857328602882c0f59fa3e846ebf9238d30

  • SSDEEP

    49152:1CDhj90ebrUT+mJ6jWd4hPR8iaFa5fo2KXx145vphG869UsKjic3:1CDhj90ebrw+FWmUahL0Xc969UsKjic3

Malware Config

Targets

    • Target

      1bc74ca2fcce354183abe5ad8d882609_JaffaCakes118

    • Size

      2.3MB

    • MD5

      1bc74ca2fcce354183abe5ad8d882609

    • SHA1

      d9e7249b76af1b4f813e784bea481d46ae646611

    • SHA256

      3e37614a1da99a7565fd06dca1a6cfbd3f3455e773179e5bf8a32c2afdaf3374

    • SHA512

      5b79fd0781eec0fdec567a57060b90e9a71d1332b6c6b184796eb58ffcecef2e9751910511c50c166d17f2e5d10784857328602882c0f59fa3e846ebf9238d30

    • SSDEEP

      49152:1CDhj90ebrUT+mJ6jWd4hPR8iaFa5fo2KXx145vphG869UsKjic3:1CDhj90ebrw+FWmUahL0Xc969UsKjic3

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      gdtadv2.jar

    • Size

      154KB

    • MD5

      fe50e038470eb25f973224e6ca586b06

    • SHA1

      49f78513677212a23c550ed63c411877f8ae559a

    • SHA256

      adce8b6675d87b74a231bdd317bb98cef24e536c48683a30ddbaed7ae6d7b207

    • SHA512

      0865e3894fa253b835c322f75930af5d831a055561600555c5042783f6e1a9227d8b6a3263ae9ef67c4a1310e2979bddcf4a1ac1be1370e8a4e56e26b0010fc0

    • SSDEEP

      3072:0epXggBY2lZxd3sgE8K0GrquKRacHwxOwKa8pfpyeBm54P6V+:0JOFNsgn4quYFQxORdwH+

    Score
    1/10

MITRE ATT&CK Matrix

Tasks