General

  • Target

    f8f6fcd01032279ad563f1ffd579f3b6_JaffaCakes118

  • Size

    29.6MB

  • Sample

    240418-28aggshf75

  • MD5

    f8f6fcd01032279ad563f1ffd579f3b6

  • SHA1

    38f94f70f57263f5f386f646a5d2095d1a5e8182

  • SHA256

    4206d8a1a8b2e634b6966086153c12e9a9e4d77ee6acc4b5da4ae951ef1128c6

  • SHA512

    27940b6046cf6a828f4d0408db2f1936a8b0d7bbc5c8ff58af89249c42f1345ccf156c97d7ea1ca53535a2418d16d8c93a8edfb2dd9419b5b3121c06d7d02b90

  • SSDEEP

    786432:3Hoc1MbbBb3CHJHRPIM4Rf9GlK8A5wjLAJxkbAuSnlsB8IzZKMqR:3oiMbdbSHfIM8fsLA+jL8xkbAuSlsB3S

Malware Config

Targets

    • Target

      f8f6fcd01032279ad563f1ffd579f3b6_JaffaCakes118

    • Size

      29.6MB

    • MD5

      f8f6fcd01032279ad563f1ffd579f3b6

    • SHA1

      38f94f70f57263f5f386f646a5d2095d1a5e8182

    • SHA256

      4206d8a1a8b2e634b6966086153c12e9a9e4d77ee6acc4b5da4ae951ef1128c6

    • SHA512

      27940b6046cf6a828f4d0408db2f1936a8b0d7bbc5c8ff58af89249c42f1345ccf156c97d7ea1ca53535a2418d16d8c93a8edfb2dd9419b5b3121c06d7d02b90

    • SSDEEP

      786432:3Hoc1MbbBb3CHJHRPIM4Rf9GlK8A5wjLAJxkbAuSnlsB8IzZKMqR:3oiMbdbSHfIM8fsLA+jL8xkbAuSlsB3S

    Score
    1/10
    • Target

      2265box.apk

    • Size

      1.9MB

    • MD5

      694e028fb7cf02f992e02ecdbcb8bb10

    • SHA1

      db132f870452c4e761da64b398f8b82f06872817

    • SHA256

      15182e38ebd5776cb43f2357b5fc5cf85ecf224e65394cd28d7f5e17e6b5b026

    • SHA512

      25478fa8b9efcc1d0e4d39f287600f78c0ad84acae4cf211bbff8d6fe98bee0922b29d8977f784d8b8432c599171fb4de44c19105e75be7eee361b8a44f2eaf4

    • SSDEEP

      49152:PKhTPeQHgfuwbO8JCqZ/r4Iz3ZMHtfs8O:P4Tlgfuwl/p8s8O

    Score
    7/10
    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks