General
-
Target
b57586e80e851efe0a1bba6ff5d763f0_JaffaCakes118
-
Size
32.0MB
-
Sample
240616-172znsvcpq
-
MD5
b57586e80e851efe0a1bba6ff5d763f0
-
SHA1
de262ee8863c8b90305ee75998a5fa09df79776e
-
SHA256
b54b395ee5f2caae3b90fb7bbe7d46ad43162b088733a21e0ddcbe933fa8b617
-
SHA512
47ac027e2d990d57c2d57232dae6d5dc9c53ff9e448e3d5285b5e9416c2e3951c7ba52e13fad122a9b91f1c155b64be4125a0b7500f7829a9bc4ac6ee95148a1
-
SSDEEP
786432:cGvn0JV70+QYDK+/OS70gmOBhRhY3JujVo6wKXXFW6BhzDEiAQKUs:cC0n0+QYJ/OS7mOBhRGMC6VXXTXsiAQe
Static task
static1
Malware Config
Targets
-
-
Target
b57586e80e851efe0a1bba6ff5d763f0_JaffaCakes118
-
Size
32.0MB
-
MD5
b57586e80e851efe0a1bba6ff5d763f0
-
SHA1
de262ee8863c8b90305ee75998a5fa09df79776e
-
SHA256
b54b395ee5f2caae3b90fb7bbe7d46ad43162b088733a21e0ddcbe933fa8b617
-
SHA512
47ac027e2d990d57c2d57232dae6d5dc9c53ff9e448e3d5285b5e9416c2e3951c7ba52e13fad122a9b91f1c155b64be4125a0b7500f7829a9bc4ac6ee95148a1
-
SSDEEP
786432:cGvn0JV70+QYDK+/OS70gmOBhRhY3JujVo6wKXXFW6BhzDEiAQKUs:cC0n0+QYJ/OS7mOBhRGMC6VXXTXsiAQe
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2