General

  • Target

    9baaae918e82603fd5959160e52819db_JaffaCakes118

  • Size

    8.6MB

  • Sample

    240610-xmpl3awgpd

  • MD5

    9baaae918e82603fd5959160e52819db

  • SHA1

    47bb48bedaa1e0e87077e372c9158cee837b6960

  • SHA256

    1f39b166ec09678b62a0c5f8e17b62d2fc4a9db4ff9d2038f2e0ca1f68c6cf18

  • SHA512

    1bc8fe06536b0188f323f33d191bc3160ffea30fd6569f49b10e810712a938f3c8f5007bb8f3a10b441e2766a35bb0d06351d1e975f19f58e689945fe691cc7b

  • SSDEEP

    196608:c0LG6dmKIhPXy6E7le/qyTVpmgbxzU4j8MB+QxVs1Temuej:c6G6AhPXLExeLTWgbx3BVBO

Malware Config

Targets

    • Target

      9baaae918e82603fd5959160e52819db_JaffaCakes118

    • Size

      8.6MB

    • MD5

      9baaae918e82603fd5959160e52819db

    • SHA1

      47bb48bedaa1e0e87077e372c9158cee837b6960

    • SHA256

      1f39b166ec09678b62a0c5f8e17b62d2fc4a9db4ff9d2038f2e0ca1f68c6cf18

    • SHA512

      1bc8fe06536b0188f323f33d191bc3160ffea30fd6569f49b10e810712a938f3c8f5007bb8f3a10b441e2766a35bb0d06351d1e975f19f58e689945fe691cc7b

    • SSDEEP

      196608:c0LG6dmKIhPXy6E7le/qyTVpmgbxzU4j8MB+QxVs1Temuej:c6G6AhPXLExeLTWgbx3BVBO

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks