General

  • Target

    f7eae31e35aa59de9cc9fa0e7dc9bae0_JaffaCakes118

  • Size

    22.8MB

  • Sample

    240418-nt5r7ada7s

  • MD5

    f7eae31e35aa59de9cc9fa0e7dc9bae0

  • SHA1

    608b7db48cdeafb59ad83e173aad7adedebdeb2f

  • SHA256

    a3bede1ab67673b970f1e348d800de0b3f7609db957f14255c49d610b5910fd0

  • SHA512

    54a858a24d7f24e75eb62cfe688553d26d525ac62eba35a5a0d1cace7c0a5f192250c682fb3ce6523707957308981c7d4519fe04c1fd2cba0b56736f0f21968e

  • SSDEEP

    393216:qm7bICNeDY5WKqzznwop0Rv83Njy7NRVb9OzRurApE3Hr38E4ZoPiIwPUlDyOvck:qfCkR0Iqiy7NRVbMqYILZ4ZoPeUlDv

Malware Config

Targets

    • Target

      f7eae31e35aa59de9cc9fa0e7dc9bae0_JaffaCakes118

    • Size

      22.8MB

    • MD5

      f7eae31e35aa59de9cc9fa0e7dc9bae0

    • SHA1

      608b7db48cdeafb59ad83e173aad7adedebdeb2f

    • SHA256

      a3bede1ab67673b970f1e348d800de0b3f7609db957f14255c49d610b5910fd0

    • SHA512

      54a858a24d7f24e75eb62cfe688553d26d525ac62eba35a5a0d1cace7c0a5f192250c682fb3ce6523707957308981c7d4519fe04c1fd2cba0b56736f0f21968e

    • SSDEEP

      393216:qm7bICNeDY5WKqzznwop0Rv83Njy7NRVb9OzRurApE3Hr38E4ZoPiIwPUlDyOvck:qfCkR0Iqiy7NRVbMqYILZ4ZoPeUlDv

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks