General

  • Target

    a7586a13caf9fb972c2702fe64207b8d_JaffaCakes118

  • Size

    12.7MB

  • Sample

    240614-ay13xa1gpl

  • MD5

    a7586a13caf9fb972c2702fe64207b8d

  • SHA1

    929e94a0ae64aec9b9290d763c37aa78c3bafd18

  • SHA256

    8c02bb6fdad25b7af0d61d32534b8cac4f4dd0c98dc75edeaa0f77ecbf589b29

  • SHA512

    05b6455266f6239e1d0b6f4fe84bacd797d3dcc335251d085ef77e633831a7f330684ed093d8d3a939a750b0d87f58509d28a31ab4a3fb4634f9a5bf013be1a8

  • SSDEEP

    393216:izRdlyBbSylxO7d12USek5nnUtyOx/igyrEbwSn:iNADli177ynUtj/nfh

Malware Config

Targets

    • Target

      a7586a13caf9fb972c2702fe64207b8d_JaffaCakes118

    • Size

      12.7MB

    • MD5

      a7586a13caf9fb972c2702fe64207b8d

    • SHA1

      929e94a0ae64aec9b9290d763c37aa78c3bafd18

    • SHA256

      8c02bb6fdad25b7af0d61d32534b8cac4f4dd0c98dc75edeaa0f77ecbf589b29

    • SHA512

      05b6455266f6239e1d0b6f4fe84bacd797d3dcc335251d085ef77e633831a7f330684ed093d8d3a939a750b0d87f58509d28a31ab4a3fb4634f9a5bf013be1a8

    • SSDEEP

      393216:izRdlyBbSylxO7d12USek5nnUtyOx/igyrEbwSn:iNADli177ynUtj/nfh

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks