General

  • Target

    ad7ee2ce1d833f889e60134366cb146a_JaffaCakes118

  • Size

    6.2MB

  • Sample

    240615-j6zdqaxckq

  • MD5

    ad7ee2ce1d833f889e60134366cb146a

  • SHA1

    d6c1fa891257ff3ae28d78db1971840ea3f2d005

  • SHA256

    8c458ce2710ab9fe17772df64bdc0fd99948a7386496b06349c1c3dc4ec9f70c

  • SHA512

    8a5c6aaad88cb3ad7e51465826e03aa703583cbd01c764c810d228fe61aa663c157e495acaed613bfe751f8642b7a5723564bec1061f0a365f74e9fcb76d2fe2

  • SSDEEP

    196608:YiYeGRAsoTYIic6kjg6FAzk2NtJKEPIvEqxc8Fc4OEy9hvdjQX:YiYeGR0gytFAVNtJUpiH4OlTvdQ

Malware Config

Targets

    • Target

      ad7ee2ce1d833f889e60134366cb146a_JaffaCakes118

    • Size

      6.2MB

    • MD5

      ad7ee2ce1d833f889e60134366cb146a

    • SHA1

      d6c1fa891257ff3ae28d78db1971840ea3f2d005

    • SHA256

      8c458ce2710ab9fe17772df64bdc0fd99948a7386496b06349c1c3dc4ec9f70c

    • SHA512

      8a5c6aaad88cb3ad7e51465826e03aa703583cbd01c764c810d228fe61aa663c157e495acaed613bfe751f8642b7a5723564bec1061f0a365f74e9fcb76d2fe2

    • SSDEEP

      196608:YiYeGRAsoTYIic6kjg6FAzk2NtJKEPIvEqxc8Fc4OEy9hvdjQX:YiYeGR0gytFAVNtJUpiH4OlTvdQ

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Target

      APRCVR

    • Size

      24KB

    • MD5

      82c165d9d49573564daa4211584fe67a

    • SHA1

      34437c6f1345b9ca096417bf66bef61da5696718

    • SHA256

      0a38eb7697d541181064c6cf66c5b8005bc9ae2e31308dca3efdd4e4eefb5a9b

    • SHA512

      52d124f8b687062337a5711f354b9270785b4bf46a23d6ad10a0ba5c6a01ad8ff70b7bacae7162219062992b2f99aae446d6af409bbaa8aba0c9e1c45ffc7b6f

    • SSDEEP

      768:1bmcL2oF2D9Ht8hV0/xCXp9Jlqxy1/F3XSJJ9PrT6uM+:BVL4n8hVGEXpCy1N3CJX/HM+

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks