General

  • Target

    a7eb06a589f09380dbf42e5dbea0698d_JaffaCakes118

  • Size

    14.8MB

  • Sample

    240614-ef52csthlb

  • MD5

    a7eb06a589f09380dbf42e5dbea0698d

  • SHA1

    07b7f880a96d7af9662fd53e67cb5b3e53799e2f

  • SHA256

    916c8c70c91f4106ea10e1034d10a0500577fd1698c6be593b64e5456b19dfc7

  • SHA512

    c1bbb22c43ce836c7ffcd33beb660b61e2e0f6a5982f63e24ffdb4f721e4547ea65648e3b9c15400559b1fd25693cf4460236a7fdfaeb6e8d9a1ca7d1a1b2ffd

  • SSDEEP

    393216:qlCliDM5u+67zs6PrGATRKXDg3H3EtZ6fg1FQl50VVS3d:qkliDMg3/xcDg3X4ZQg1FQH07+

Malware Config

Targets

    • Target

      a7eb06a589f09380dbf42e5dbea0698d_JaffaCakes118

    • Size

      14.8MB

    • MD5

      a7eb06a589f09380dbf42e5dbea0698d

    • SHA1

      07b7f880a96d7af9662fd53e67cb5b3e53799e2f

    • SHA256

      916c8c70c91f4106ea10e1034d10a0500577fd1698c6be593b64e5456b19dfc7

    • SHA512

      c1bbb22c43ce836c7ffcd33beb660b61e2e0f6a5982f63e24ffdb4f721e4547ea65648e3b9c15400559b1fd25693cf4460236a7fdfaeb6e8d9a1ca7d1a1b2ffd

    • SSDEEP

      393216:qlCliDM5u+67zs6PrGATRKXDg3H3EtZ6fg1FQl50VVS3d:qkliDMg3/xcDg3X4ZQg1FQH07+

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Matrix

Tasks