General

  • Target

    03bbf7c243c68cc8f1aa576602379479_JaffaCakes118

  • Size

    10.9MB

  • Sample

    240427-12m9bshh61

  • MD5

    03bbf7c243c68cc8f1aa576602379479

  • SHA1

    a5e9d90846fbe3e0ea87e04236227694db13b082

  • SHA256

    968a1e301305711b02c7da9871d91df97da0724a45f80270207b26801f75159f

  • SHA512

    9efa5e767bb48c533849ad5b74711f6194b1891e44d43873e5927c0762e7d7e81d0dcc36ad0de82f10d129e872dbbf3d42cb3c4c5f0669e1ad1c16a8ccae54df

  • SSDEEP

    196608:ZumKoCT0tFDWtDf8L9A3jmLyAQAvKSFkURFXKdhQJXXP7w4Z8vJAxuJho83WodWa:ZMZsATyfQAlFksadhQN7w4Z8ws68zW1Y

Malware Config

Targets

    • Target

      03bbf7c243c68cc8f1aa576602379479_JaffaCakes118

    • Size

      10.9MB

    • MD5

      03bbf7c243c68cc8f1aa576602379479

    • SHA1

      a5e9d90846fbe3e0ea87e04236227694db13b082

    • SHA256

      968a1e301305711b02c7da9871d91df97da0724a45f80270207b26801f75159f

    • SHA512

      9efa5e767bb48c533849ad5b74711f6194b1891e44d43873e5927c0762e7d7e81d0dcc36ad0de82f10d129e872dbbf3d42cb3c4c5f0669e1ad1c16a8ccae54df

    • SSDEEP

      196608:ZumKoCT0tFDWtDf8L9A3jmLyAQAvKSFkURFXKdhQJXXP7w4Z8vJAxuJho83WodWa:ZMZsATyfQAlFksadhQN7w4Z8ws68zW1Y

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks