General

  • Target

    6d49d6a3cae1f0f1d4c11889da516612_JaffaCakes118

  • Size

    21.1MB

  • Sample

    240524-epk3jscf38

  • MD5

    6d49d6a3cae1f0f1d4c11889da516612

  • SHA1

    4dabcf907b91bc368a552b198a699ba8b777524f

  • SHA256

    144c9521adf253acff2730d902232769c16e6751c5d635e2d051e7baa7f296ef

  • SHA512

    42bb6c84bcce0b4a386ae509c0c16fd0db05918b0887f6eba2174e6b3041dae08d629e675ff702c8189444a268467b0419692decda836af79924c78065faa485

  • SSDEEP

    393216:8T9Jwe6d+tphRJGl4JmVQgM0MovUkqPP4tc8JuL5o+bNJfxt2j0Vvg:gieptpVGq2MovIX4KVpbZ+0VY

Malware Config

Targets

    • Target

      6d49d6a3cae1f0f1d4c11889da516612_JaffaCakes118

    • Size

      21.1MB

    • MD5

      6d49d6a3cae1f0f1d4c11889da516612

    • SHA1

      4dabcf907b91bc368a552b198a699ba8b777524f

    • SHA256

      144c9521adf253acff2730d902232769c16e6751c5d635e2d051e7baa7f296ef

    • SHA512

      42bb6c84bcce0b4a386ae509c0c16fd0db05918b0887f6eba2174e6b3041dae08d629e675ff702c8189444a268467b0419692decda836af79924c78065faa485

    • SSDEEP

      393216:8T9Jwe6d+tphRJGl4JmVQgM0MovUkqPP4tc8JuL5o+bNJfxt2j0Vvg:gieptpVGq2MovIX4KVpbZ+0VY

    Score
    7/10
    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Matrix

Tasks