General

  • Target

    461ea8557e21f992f429544424cb15ee_JaffaCakes118

  • Size

    8.1MB

  • Sample

    240515-pc1btagh59

  • MD5

    461ea8557e21f992f429544424cb15ee

  • SHA1

    dfbe7843d2b65f198ce94727fdbea0e14973351e

  • SHA256

    9a4e6b395bbfc447d66b7575bd3e6de1e32221bc2e45c65f90106d30a5657147

  • SHA512

    803522fdd31e0a31df0d4519add1f1d29bce093dc5d288aa589ab9970718028a156b0ae62713406b2b459d6e8771d03e2971f704bb7f8e0042b0fe7b19c1a1cf

  • SSDEEP

    196608:YZn1ESThV/q2sJgD2CVpYlVqf/wTZYL0SxjNa9lWYIzFg3HF43Tswm:i1PTh82sJgekIY0SxZIlW3zFmOsh

Malware Config

Targets

    • Target

      461ea8557e21f992f429544424cb15ee_JaffaCakes118

    • Size

      8.1MB

    • MD5

      461ea8557e21f992f429544424cb15ee

    • SHA1

      dfbe7843d2b65f198ce94727fdbea0e14973351e

    • SHA256

      9a4e6b395bbfc447d66b7575bd3e6de1e32221bc2e45c65f90106d30a5657147

    • SHA512

      803522fdd31e0a31df0d4519add1f1d29bce093dc5d288aa589ab9970718028a156b0ae62713406b2b459d6e8771d03e2971f704bb7f8e0042b0fe7b19c1a1cf

    • SSDEEP

      196608:YZn1ESThV/q2sJgD2CVpYlVqf/wTZYL0SxjNa9lWYIzFg3HF43Tswm:i1PTh82sJgekIY0SxZIlW3zFmOsh

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks