General

  • Target

    318a968a21aad759b7bb2b53d03989b9_JaffaCakes118

  • Size

    31.0MB

  • Sample

    240510-3at9nsac72

  • MD5

    318a968a21aad759b7bb2b53d03989b9

  • SHA1

    e90dc8d4523a70c4c7ad2d5f9e1ac771efe2c82a

  • SHA256

    12bee94b65864aeac63cbb243ed459f45db8329079668f2132750ad384208d12

  • SHA512

    dca91ac0f9be268e38be2944e6c92ed96f767dcc599539b677322e44d74ed7b98d97b97bbf3e33fe4b3f7ca8b6522c474b39a06360fa929efcc7a419645c8455

  • SSDEEP

    786432:XoWWqmebNCG/R6MND1zpxW9M1jm7MR9U5moKL8ZbKtjBDkFD+6JrYSfAQq:XoWvV/RDND1zcM1yYrymr8ZGtBDkFD+N

Malware Config

Targets

    • Target

      318a968a21aad759b7bb2b53d03989b9_JaffaCakes118

    • Size

      31.0MB

    • MD5

      318a968a21aad759b7bb2b53d03989b9

    • SHA1

      e90dc8d4523a70c4c7ad2d5f9e1ac771efe2c82a

    • SHA256

      12bee94b65864aeac63cbb243ed459f45db8329079668f2132750ad384208d12

    • SHA512

      dca91ac0f9be268e38be2944e6c92ed96f767dcc599539b677322e44d74ed7b98d97b97bbf3e33fe4b3f7ca8b6522c474b39a06360fa929efcc7a419645c8455

    • SSDEEP

      786432:XoWWqmebNCG/R6MND1zpxW9M1jm7MR9U5moKL8ZbKtjBDkFD+6JrYSfAQq:XoWvV/RDND1zcM1yYrymr8ZGtBDkFD+N

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks