General

  • Target

    c9e3d24ea3e423242ef381087f881fce_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240405-eafvaabh62

  • MD5

    c9e3d24ea3e423242ef381087f881fce

  • SHA1

    b4e586b90e5a469a4a6570462c3bebb154c813cd

  • SHA256

    f0db50b396bcdf71b48a19656fa4d9fb4a6bf8b920a667dde5d971c2f3309f50

  • SHA512

    93bf68ddbfd4e0bacc65f96b14084a82931dbc5e6aee31f3aa91423bf18356d62210bb18a28a292e674a35babe0fd80e36c68211938e39350b53f960d27a905d

  • SSDEEP

    49152:7/jRITrLgJnJn5u4nYR+7z1hFrGHQoDqg2fRJTre7SGM:7rRIPLwnZUUYR+LFy9uR+SV

Malware Config

Targets

    • Target

      c9e3d24ea3e423242ef381087f881fce_JaffaCakes118

    • Size

      1.7MB

    • MD5

      c9e3d24ea3e423242ef381087f881fce

    • SHA1

      b4e586b90e5a469a4a6570462c3bebb154c813cd

    • SHA256

      f0db50b396bcdf71b48a19656fa4d9fb4a6bf8b920a667dde5d971c2f3309f50

    • SHA512

      93bf68ddbfd4e0bacc65f96b14084a82931dbc5e6aee31f3aa91423bf18356d62210bb18a28a292e674a35babe0fd80e36c68211938e39350b53f960d27a905d

    • SSDEEP

      49152:7/jRITrLgJnJn5u4nYR+7z1hFrGHQoDqg2fRJTre7SGM:7rRIPLwnZUUYR+LFy9uR+SV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks