General

  • Target

    325e6c358945b734a6240fd2fbcb8f7b_JaffaCakes118

  • Size

    17.4MB

  • Sample

    240511-dgjdbacb56

  • MD5

    325e6c358945b734a6240fd2fbcb8f7b

  • SHA1

    a2e5e9232d2be62452fca364dd20389d1a384dae

  • SHA256

    15d2ade33532e6a9907081c5011f2f9e258177f8bbf14ea0608b18c98433814c

  • SHA512

    98aa0d1c200d3e3ac3218b585165a04845ea91d609c096b8d4246585bc722d3562414ffa605846734bf12bf3e7d089a00aac8afb25ee40e12903749db402f613

  • SSDEEP

    393216:OIUgbZWJq2qJWpvwWbUcVjFRXx1diKlFtKMV1ttSKsEPS:OtgbZWIFW4Qj1v1lFQMtt7sEK

Malware Config

Targets

    • Target

      325e6c358945b734a6240fd2fbcb8f7b_JaffaCakes118

    • Size

      17.4MB

    • MD5

      325e6c358945b734a6240fd2fbcb8f7b

    • SHA1

      a2e5e9232d2be62452fca364dd20389d1a384dae

    • SHA256

      15d2ade33532e6a9907081c5011f2f9e258177f8bbf14ea0608b18c98433814c

    • SHA512

      98aa0d1c200d3e3ac3218b585165a04845ea91d609c096b8d4246585bc722d3562414ffa605846734bf12bf3e7d089a00aac8afb25ee40e12903749db402f613

    • SSDEEP

      393216:OIUgbZWJq2qJWpvwWbUcVjFRXx1diKlFtKMV1ttSKsEPS:OtgbZWIFW4Qj1v1lFQMtt7sEK

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks