General

  • Target

    d1e818d515302837684c149ed73ef92c_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240405-m4lavsaf45

  • MD5

    d1e818d515302837684c149ed73ef92c

  • SHA1

    b7f38084a857a9ee384fa1a09c8dd83c5e67f6c9

  • SHA256

    607f9debd6105265be00bb3e53307765222b8915082d8b6e44d1a9d74861dc72

  • SHA512

    d7f4dbacbadb90b99316b775a63655be7dbd83460d7a0da7d767e37c11b8d16c82afa5deec4d3eeb3a8e7483b8f641bf5fca011320c65707bb51013ff8ba6888

  • SSDEEP

    393216:ZONPXBL3FFxnm1ucDS+N6cP+r2tF9Y83E7gf/dgmRYtjD:ZO5xpm1dbNLF9RUc2mWtH

Malware Config

Targets

    • Target

      d1e818d515302837684c149ed73ef92c_JaffaCakes118

    • Size

      17.9MB

    • MD5

      d1e818d515302837684c149ed73ef92c

    • SHA1

      b7f38084a857a9ee384fa1a09c8dd83c5e67f6c9

    • SHA256

      607f9debd6105265be00bb3e53307765222b8915082d8b6e44d1a9d74861dc72

    • SHA512

      d7f4dbacbadb90b99316b775a63655be7dbd83460d7a0da7d767e37c11b8d16c82afa5deec4d3eeb3a8e7483b8f641bf5fca011320c65707bb51013ff8ba6888

    • SSDEEP

      393216:ZONPXBL3FFxnm1ucDS+N6cP+r2tF9Y83E7gf/dgmRYtjD:ZO5xpm1dbNLF9RUc2mWtH

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks