General

  • Target

    ebb956ada048684108f02f3076f21861_JaffaCakes118

  • Size

    13.4MB

  • Sample

    240410-w67fjsbb6v

  • MD5

    ebb956ada048684108f02f3076f21861

  • SHA1

    89e1f3de295465d3c0e76e58f843be1f0d8fb9d8

  • SHA256

    848f8d96dc6d4246a6572cf877cd086b3003e047054739cd2809709cd8d1e4b2

  • SHA512

    de01522284c0f7763aab33b85a42e93584aeb765f59f015c35aa9616f081c58436245178a3be6d97fae32a6ffefddf0a8183e260d6169af77cb86491adde0fe4

  • SSDEEP

    196608:UirBJb4+pkKERkIWPuywsQ3diYBOFMewpSEYF9zqInZ+0P8eIH0KzJyQqmT99k1l:trbdDQWmdiMfYEMGI3PRIblHZqOa

Malware Config

Targets

    • Target

      ebb956ada048684108f02f3076f21861_JaffaCakes118

    • Size

      13.4MB

    • MD5

      ebb956ada048684108f02f3076f21861

    • SHA1

      89e1f3de295465d3c0e76e58f843be1f0d8fb9d8

    • SHA256

      848f8d96dc6d4246a6572cf877cd086b3003e047054739cd2809709cd8d1e4b2

    • SHA512

      de01522284c0f7763aab33b85a42e93584aeb765f59f015c35aa9616f081c58436245178a3be6d97fae32a6ffefddf0a8183e260d6169af77cb86491adde0fe4

    • SSDEEP

      196608:UirBJb4+pkKERkIWPuywsQ3diYBOFMewpSEYF9zqInZ+0P8eIH0KzJyQqmT99k1l:trbdDQWmdiMfYEMGI3PRIblHZqOa

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks