General

  • Target

    f99958f277e1eb858a809ac107cb7c61_JaffaCakes118

  • Size

    6.4MB

  • Sample

    240419-f5h4kaba4t

  • MD5

    f99958f277e1eb858a809ac107cb7c61

  • SHA1

    b6ae13023ac1117ae78b974858e12b2e77d2b82d

  • SHA256

    bd49f8744e72498ba891de83a67e8c9cf0a74b9fea45ad7212ba20d17698897c

  • SHA512

    bf1f71d75e7cf942d5a3b94f5926ff383842d82ff26535baccbeee2ff83c76b43dbf0eb189fa2182be877599bcae5dd20ce8d25c1a110b3a1c7a91afdfc980c3

  • SSDEEP

    196608:RMiBXr7woKqZRpl3Wd7jYKXUpTgqw9EHJyAc4z:R977HKqZbl3Wd7jAjw9XAc4z

Malware Config

Targets

    • Target

      f99958f277e1eb858a809ac107cb7c61_JaffaCakes118

    • Size

      6.4MB

    • MD5

      f99958f277e1eb858a809ac107cb7c61

    • SHA1

      b6ae13023ac1117ae78b974858e12b2e77d2b82d

    • SHA256

      bd49f8744e72498ba891de83a67e8c9cf0a74b9fea45ad7212ba20d17698897c

    • SHA512

      bf1f71d75e7cf942d5a3b94f5926ff383842d82ff26535baccbeee2ff83c76b43dbf0eb189fa2182be877599bcae5dd20ce8d25c1a110b3a1c7a91afdfc980c3

    • SSDEEP

      196608:RMiBXr7woKqZRpl3Wd7jYKXUpTgqw9EHJyAc4z:R977HKqZbl3Wd7jAjw9XAc4z

    Score
    7/10
    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks