General

  • Target

    3f2e63e2827d44ecd86379cdca85ee6a_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240513-m77y2ace64

  • MD5

    3f2e63e2827d44ecd86379cdca85ee6a

  • SHA1

    b83b291272a1d7804bd3268cde1c052a812d0d55

  • SHA256

    cc8fff7dbb2aef957668ee4ed53aebc83f297b96003c03867b506084085da71a

  • SHA512

    5afa051eda19b8ff0c1b3fe989599673556c22efa2c1c64b60d19f105ca0348385eda4adb347ce214432c4afce6341f962fb91640e62aec8946b9c149e32fdb7

  • SSDEEP

    393216:4U9PkC6fMBU9o5NNm4XCoDdHElqERkhhI48VJIDz:4AEMG9o3jSuiFVsz

Malware Config

Targets

    • Target

      3f2e63e2827d44ecd86379cdca85ee6a_JaffaCakes118

    • Size

      12.3MB

    • MD5

      3f2e63e2827d44ecd86379cdca85ee6a

    • SHA1

      b83b291272a1d7804bd3268cde1c052a812d0d55

    • SHA256

      cc8fff7dbb2aef957668ee4ed53aebc83f297b96003c03867b506084085da71a

    • SHA512

      5afa051eda19b8ff0c1b3fe989599673556c22efa2c1c64b60d19f105ca0348385eda4adb347ce214432c4afce6341f962fb91640e62aec8946b9c149e32fdb7

    • SSDEEP

      393216:4U9PkC6fMBU9o5NNm4XCoDdHElqERkhhI48VJIDz:4AEMG9o3jSuiFVsz

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks