General

  • Target

    f64bc928e4427533a16b550d71aaaa1b_JaffaCakes118

  • Size

    29.0MB

  • Sample

    240417-vzxgbsgf42

  • MD5

    f64bc928e4427533a16b550d71aaaa1b

  • SHA1

    bd7ca0bc59dd3f29fa59cf2f736b108e50bc9807

  • SHA256

    e98d91ec70a9d37f5f74348bbf7a41089b8d423e56ebb89e4097fb2ebd5a58a4

  • SHA512

    b9a36cba1a8add886939e3182e4994f72f798df1c235a3e07af9408bb818f10def41d464edddcde651181a18d75140d572f349b5b9ee3cf8bc9d22776c8a6650

  • SSDEEP

    786432:hEkCyMrQewq+cthxZxaXwnjOsmj/i/7khhNyGRm04MHxGB:+koJrrxXHjVmj/iKNyG47

Malware Config

Targets

    • Target

      f64bc928e4427533a16b550d71aaaa1b_JaffaCakes118

    • Size

      29.0MB

    • MD5

      f64bc928e4427533a16b550d71aaaa1b

    • SHA1

      bd7ca0bc59dd3f29fa59cf2f736b108e50bc9807

    • SHA256

      e98d91ec70a9d37f5f74348bbf7a41089b8d423e56ebb89e4097fb2ebd5a58a4

    • SHA512

      b9a36cba1a8add886939e3182e4994f72f798df1c235a3e07af9408bb818f10def41d464edddcde651181a18d75140d572f349b5b9ee3cf8bc9d22776c8a6650

    • SSDEEP

      786432:hEkCyMrQewq+cthxZxaXwnjOsmj/i/7khhNyGRm04MHxGB:+koJrrxXHjVmj/iKNyG47

    Score
    7/10
    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks