General

  • Target

    b50739b1edace484d46efc475bf575fe_JaffaCakes118

  • Size

    4.4MB

  • Sample

    240616-y5r1kszemj

  • MD5

    b50739b1edace484d46efc475bf575fe

  • SHA1

    9ae8709c519b14226aef317cd5b05d2f345d70c4

  • SHA256

    ab527e5908887a78f40b002141f96fad1dab1136d522149da985f18e75105bf9

  • SHA512

    e30178abea26aa1e8b4d488b55f5d7c9c4ec2a779d5f635210f5a68ad5602654001b3fc1398aec9afdfc6b6f15d6371566d9859c5f1c391290e79701f28bbe2a

  • SSDEEP

    98304:6JbHr9X/ATdo3xCsUaeKeI3VmgKcf3JF2Uvx5lWAE31wUOOSBRh2rXoB2WNI:6dB/qo3xrJrVmgKcf3JF2ux5kz96DJNI

Malware Config

Targets

    • Target

      b50739b1edace484d46efc475bf575fe_JaffaCakes118

    • Size

      4.4MB

    • MD5

      b50739b1edace484d46efc475bf575fe

    • SHA1

      9ae8709c519b14226aef317cd5b05d2f345d70c4

    • SHA256

      ab527e5908887a78f40b002141f96fad1dab1136d522149da985f18e75105bf9

    • SHA512

      e30178abea26aa1e8b4d488b55f5d7c9c4ec2a779d5f635210f5a68ad5602654001b3fc1398aec9afdfc6b6f15d6371566d9859c5f1c391290e79701f28bbe2a

    • SSDEEP

      98304:6JbHr9X/ATdo3xCsUaeKeI3VmgKcf3JF2Uvx5lWAE31wUOOSBRh2rXoB2WNI:6dB/qo3xrJrVmgKcf3JF2ux5kz96DJNI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks