General

  • Target

    f01159d3fbaf62c2311d5a7e64687a57_JaffaCakes118

  • Size

    10.2MB

  • Sample

    240415-crpgmseg5t

  • MD5

    f01159d3fbaf62c2311d5a7e64687a57

  • SHA1

    4c741be9824d4bdc28423d372048cd555e709f57

  • SHA256

    eeebc5778acfe06a0cc58f80b3c3feba3fa1cf7bec7dfec74c681eedf3100666

  • SHA512

    89cf0f38c1d0a3f822dc455681bcdbad1a9dc141a39cf7577c00c3ba9748751d6a29734863e76a0a14c68423ad61f2e948263b02e4210d6cac612c407c34a3a6

  • SSDEEP

    196608:7guIW9+L1BdWEdPTrFuOd00pM9qCQtHwuiEQ9WAcu7zsABYFwS0e5IU7UcnKKVlp:7gs9+LPdzPTxbu0RRCMABCj

Malware Config

Targets

    • Target

      f01159d3fbaf62c2311d5a7e64687a57_JaffaCakes118

    • Size

      10.2MB

    • MD5

      f01159d3fbaf62c2311d5a7e64687a57

    • SHA1

      4c741be9824d4bdc28423d372048cd555e709f57

    • SHA256

      eeebc5778acfe06a0cc58f80b3c3feba3fa1cf7bec7dfec74c681eedf3100666

    • SHA512

      89cf0f38c1d0a3f822dc455681bcdbad1a9dc141a39cf7577c00c3ba9748751d6a29734863e76a0a14c68423ad61f2e948263b02e4210d6cac612c407c34a3a6

    • SSDEEP

      196608:7guIW9+L1BdWEdPTrFuOd00pM9qCQtHwuiEQ9WAcu7zsABYFwS0e5IU7UcnKKVlp:7gs9+LPdzPTxbu0RRCMABCj

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks