General

  • Target

    531bdc5ca684cf72027be110cc26fb65_JaffaCakes118

  • Size

    26.9MB

  • Sample

    240518-fje5sacf8s

  • MD5

    531bdc5ca684cf72027be110cc26fb65

  • SHA1

    fe35613d0f11cc00177ee70ac53fcfd85f4e2644

  • SHA256

    4a8bb48a44db9f42d902d09d5ca78893883418a09321141a21f4de7211cf27e8

  • SHA512

    ebc149e69fe3bd2e83d9f84b4143cc56e495b52c79547cb47c0110842d33eee32286f5adb813a169246fd4399e64f273bef3bc0aa01b6ac19e364047872ff5bc

  • SSDEEP

    786432:cmRtNCl51C+UFmGP1TViptokpmVb9cXkEmVss:bRrkhYms1TVipBuRcM

Malware Config

Targets

    • Target

      531bdc5ca684cf72027be110cc26fb65_JaffaCakes118

    • Size

      26.9MB

    • MD5

      531bdc5ca684cf72027be110cc26fb65

    • SHA1

      fe35613d0f11cc00177ee70ac53fcfd85f4e2644

    • SHA256

      4a8bb48a44db9f42d902d09d5ca78893883418a09321141a21f4de7211cf27e8

    • SHA512

      ebc149e69fe3bd2e83d9f84b4143cc56e495b52c79547cb47c0110842d33eee32286f5adb813a169246fd4399e64f273bef3bc0aa01b6ac19e364047872ff5bc

    • SSDEEP

      786432:cmRtNCl51C+UFmGP1TViptokpmVb9cXkEmVss:bRrkhYms1TVipBuRcM

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      MidasEmptyRes1.apk

    • Size

      5KB

    • MD5

      ea61a6cf8e8833e6181fe290d3255bb9

    • SHA1

      d1fc64d826b85c9cfbcc06fdeb7a01fc5437d873

    • SHA256

      a3c9e0815200dd3393499989525b95eace42f75c2be9f06c4b48a0d649d783ec

    • SHA512

      690c52c6ab0c8dce871ff23bde14723815a4bc607893f8ff5c5172228a1d955cddf6f8d12d3dde0104d1c92e3f9a0432707d322f8132b36c3827561b388f8896

    • SSDEEP

      96:dPG7WMxInKy+0E8AGtFvrPdOdAf56PgIDdy0QCGOf:JG6MxWtERGtFZfIDdQCxf

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks