General

  • Target

    3e5924172a3cb34affd1df12923b0050_JaffaCakes118

  • Size

    3.6MB

  • Sample

    240513-h8vb4sfb99

  • MD5

    3e5924172a3cb34affd1df12923b0050

  • SHA1

    be0e7b802c50a160433f3f625eea957888c025cb

  • SHA256

    b959504cc5a7139d53393b8ca8e1191d088011d63f79b038ee565c241c47f7e1

  • SHA512

    76f23772f088f5876769d8c9b40e57fa64460259194ee77bacdc5d71e03821390da2ecc350b9765ed6dbf0e89122f5bd346bd75fe15107f1e9d62aaa988440d2

  • SSDEEP

    98304:9UOlbDvAjnYQp+ZmXhYjfB3amHc4Nlnlq6QGBjG6GfERzvwDXQ:9U0bDPaXmTpad4s9GBjPaEhvwLQ

Malware Config

Targets

    • Target

      3e5924172a3cb34affd1df12923b0050_JaffaCakes118

    • Size

      3.6MB

    • MD5

      3e5924172a3cb34affd1df12923b0050

    • SHA1

      be0e7b802c50a160433f3f625eea957888c025cb

    • SHA256

      b959504cc5a7139d53393b8ca8e1191d088011d63f79b038ee565c241c47f7e1

    • SHA512

      76f23772f088f5876769d8c9b40e57fa64460259194ee77bacdc5d71e03821390da2ecc350b9765ed6dbf0e89122f5bd346bd75fe15107f1e9d62aaa988440d2

    • SSDEEP

      98304:9UOlbDvAjnYQp+ZmXhYjfB3amHc4Nlnlq6QGBjG6GfERzvwDXQ:9U0bDPaXmTpad4s9GBjPaEhvwLQ

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks