General

  • Target

    48ee2b012f4428b5313c1186dc242765_JaffaCakes118

  • Size

    17.8MB

  • Sample

    240516-btgzxadh9z

  • MD5

    48ee2b012f4428b5313c1186dc242765

  • SHA1

    b5ca98bcbfec0fbf4f9f9da66936411559318f6c

  • SHA256

    7bcdc11c73154bd0a13f5ee3f0f936fd7b18f3ae9f095a20a5bc6b41dd2becec

  • SHA512

    47f96422262e40d39b40b962ef4eeac1907e92cd0e2f3f21e9a0ec1502579765a238ee7e02ba937e7a08accd9456fcaf7294cbcc30b217b7e500545ecc1b463a

  • SSDEEP

    393216:cTphMWmAJWd57zS47eBSTD8FbLj2y5gYJPNMrGIu+jMC:cTpCWVJWPfS4ywT4n2rYJPuc5C

Malware Config

Targets

    • Target

      48ee2b012f4428b5313c1186dc242765_JaffaCakes118

    • Size

      17.8MB

    • MD5

      48ee2b012f4428b5313c1186dc242765

    • SHA1

      b5ca98bcbfec0fbf4f9f9da66936411559318f6c

    • SHA256

      7bcdc11c73154bd0a13f5ee3f0f936fd7b18f3ae9f095a20a5bc6b41dd2becec

    • SHA512

      47f96422262e40d39b40b962ef4eeac1907e92cd0e2f3f21e9a0ec1502579765a238ee7e02ba937e7a08accd9456fcaf7294cbcc30b217b7e500545ecc1b463a

    • SSDEEP

      393216:cTphMWmAJWd57zS47eBSTD8FbLj2y5gYJPNMrGIu+jMC:cTpCWVJWPfS4ywT4n2rYJPuc5C

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks