General

  • Target

    b8c38dc92719aa9f4c6cb96fa9d6f278_JaffaCakes118

  • Size

    10.2MB

  • Sample

    240404-p2rqzagg69

  • MD5

    b8c38dc92719aa9f4c6cb96fa9d6f278

  • SHA1

    8c5a65b080716cbfd791e8f5696e6c0185ec8031

  • SHA256

    e719ec213ba9e467a0adaefb31e12f95278b7c918540acd85a7fa87d6471410e

  • SHA512

    2e159faa3b02c03953a0a6d2ac18477128ccc63bb0613cf570b7d76057d3598c4a5ec4079436454c05ae7e532d98073889ece386c2fcb30f6ce40bb5ad504464

  • SSDEEP

    196608:NFUsWLI4pJ+JTNP3K67jT00wRdYw2HPelNevZNy8p/uxCPDMdLG:bUsuI4OZNP3b7v0tuelsZNVtuxUDMdS

Malware Config

Targets

    • Target

      b8c38dc92719aa9f4c6cb96fa9d6f278_JaffaCakes118

    • Size

      10.2MB

    • MD5

      b8c38dc92719aa9f4c6cb96fa9d6f278

    • SHA1

      8c5a65b080716cbfd791e8f5696e6c0185ec8031

    • SHA256

      e719ec213ba9e467a0adaefb31e12f95278b7c918540acd85a7fa87d6471410e

    • SHA512

      2e159faa3b02c03953a0a6d2ac18477128ccc63bb0613cf570b7d76057d3598c4a5ec4079436454c05ae7e532d98073889ece386c2fcb30f6ce40bb5ad504464

    • SSDEEP

      196608:NFUsWLI4pJ+JTNP3K67jT00wRdYw2HPelNevZNy8p/uxCPDMdLG:bUsuI4OZNP3b7v0tuelsZNVtuxUDMdS

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks