General

  • Target

    954929bb01220b056e1de0063b6ca686_JaffaCakes118

  • Size

    15.1MB

  • Sample

    240604-seg5ssba3z

  • MD5

    954929bb01220b056e1de0063b6ca686

  • SHA1

    1abb1f9b1e5c291d1eb3b6ca99f19458f9e33e5e

  • SHA256

    4d3b61726b9709c4b419e54bdd76266748c3419fc00937c212ed63b7904b5d04

  • SHA512

    66b6568f30c26969bc56bde6fc8a3cce39b237244dbd12f552e2785dbbe651c58725c8452b481fc3d2afc79c2a825e96627a948250ca57cb16c30378accc584b

  • SSDEEP

    393216:FAItX5OixLM1IuQdqSjpBNlcRghuFyfTByUy8hNCibg:FAK5DRp/a6uMBPy8hhk

Malware Config

Targets

    • Target

      954929bb01220b056e1de0063b6ca686_JaffaCakes118

    • Size

      15.1MB

    • MD5

      954929bb01220b056e1de0063b6ca686

    • SHA1

      1abb1f9b1e5c291d1eb3b6ca99f19458f9e33e5e

    • SHA256

      4d3b61726b9709c4b419e54bdd76266748c3419fc00937c212ed63b7904b5d04

    • SHA512

      66b6568f30c26969bc56bde6fc8a3cce39b237244dbd12f552e2785dbbe651c58725c8452b481fc3d2afc79c2a825e96627a948250ca57cb16c30378accc584b

    • SSDEEP

      393216:FAItX5OixLM1IuQdqSjpBNlcRghuFyfTByUy8hNCibg:FAK5DRp/a6uMBPy8hhk

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Target

      gamebox.apk

    • Size

      1.7MB

    • MD5

      fc76d2f2593de86bfb1e3f030b37e6fa

    • SHA1

      e27026a53a51a0823c8d4eb6b70b4d6377f530f5

    • SHA256

      913d4d664cd5872f03470505f751ed1e303531d1c667497d297923acc01409fd

    • SHA512

      b8a510ac6d45998e21be3d817df091123e21d73695b2059f1510491e6be818e299a80aa9b53d914f7d1160e9e920211acdfc79054360e989d366270b050a7df0

    • SSDEEP

      49152:N2AtOK4P7HSB1IhZNQwfyeq552L6YBoru:N2iOK48+hZNu5EmYMu

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks