General

  • Target

    97ead4a118afeabf2f0c8c168b78ca14_JaffaCakes118

  • Size

    25.5MB

  • Sample

    240605-mv5cdaec58

  • MD5

    97ead4a118afeabf2f0c8c168b78ca14

  • SHA1

    2cc9bbb9da7007b0d8167081aa8dba5caf58aa74

  • SHA256

    cd8b692296472d2a13a4418fe6b4842b5b7384537ddcc3a8c539df84b59aa138

  • SHA512

    2e352c1202ce1854190cc41edbeeec2a9dfa12ccfa8feba4789a150197107062bcb730386eadaee1aa27ab71903d878d6026afe4034b27a07dd2548266f95b52

  • SSDEEP

    786432:ameOy66QfXSlAqcUyywizs+T8T9pe3yxCWmAHz:ameO6wXaAqcUy1M8wuZ1z

Malware Config

Targets

    • Target

      97ead4a118afeabf2f0c8c168b78ca14_JaffaCakes118

    • Size

      25.5MB

    • MD5

      97ead4a118afeabf2f0c8c168b78ca14

    • SHA1

      2cc9bbb9da7007b0d8167081aa8dba5caf58aa74

    • SHA256

      cd8b692296472d2a13a4418fe6b4842b5b7384537ddcc3a8c539df84b59aa138

    • SHA512

      2e352c1202ce1854190cc41edbeeec2a9dfa12ccfa8feba4789a150197107062bcb730386eadaee1aa27ab71903d878d6026afe4034b27a07dd2548266f95b52

    • SSDEEP

      786432:ameOy66QfXSlAqcUyywizs+T8T9pe3yxCWmAHz:ameO6wXaAqcUy1M8wuZ1z

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Target

      amap_resource1_0_0.png

    • Size

      24KB

    • MD5

      94a2a5f84a3fd6f0fd9134708ae1b81e

    • SHA1

      1e21afaa48ed86cb31aaf7b17c3514315364cc99

    • SHA256

      fc0c21884d4edfa4d93282139a309f204b27271a111a5b158edbc048f730b461

    • SHA512

      24a175d15cb5cf8d23f0d53b004ed5c9a47646129c816fcae1b46aedabd95bb2c6dd2958d39d6f98f36dec3cd55d6af2d9b8f7013ced4b37a30db566e9a44923

    • SSDEEP

      384:SevEWnTSCwukBdJ4dVCHyP7MPi3oqYXgnJk:3vEWnSue4+Sf3opQa

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks