General

  • Target

    4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118

  • Size

    6.2MB

  • Sample

    240331-d2hmhsda4v

  • MD5

    4bf739f82cf01d051be37a2503c0cdf7

  • SHA1

    798fa8eba6ec79bf1811e8a70f94d46f30d4cebd

  • SHA256

    d3f97db83c40f59b19c9e958e552f1fa77defc7f79d4e1e366ccb72edba8dcb4

  • SHA512

    fb93a34de7cd9bd0439e3fb1c8108ce14ec0d4f69c9de3d87e1c235be22b9fe88b55fb55fa6a955d70c0eed6914516fa226dab315f6d6cf73f0a04dd8da33822

  • SSDEEP

    196608:FBoDy/72edU3YtJqf1UUdsVRwU9fV9q+F:FuiUotJqDWL795F

Score
10/10

Malware Config

Targets

    • Target

      4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118

    • Size

      6.2MB

    • MD5

      4bf739f82cf01d051be37a2503c0cdf7

    • SHA1

      798fa8eba6ec79bf1811e8a70f94d46f30d4cebd

    • SHA256

      d3f97db83c40f59b19c9e958e552f1fa77defc7f79d4e1e366ccb72edba8dcb4

    • SHA512

      fb93a34de7cd9bd0439e3fb1c8108ce14ec0d4f69c9de3d87e1c235be22b9fe88b55fb55fa6a955d70c0eed6914516fa226dab315f6d6cf73f0a04dd8da33822

    • SSDEEP

      196608:FBoDy/72edU3YtJqf1UUdsVRwU9fV9q+F:FuiUotJqDWL795F

    Score
    7/10
    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Mobile v15

Tasks