General

  • Target

    0c9530f09cc891b40baa4c5b97487afd_JaffaCakes118

  • Size

    17.0MB

  • Sample

    240625-e9588a1brc

  • MD5

    0c9530f09cc891b40baa4c5b97487afd

  • SHA1

    e0db7762db516d9604a74be5a4d08919a18e57b7

  • SHA256

    50127e2ddc9b5aa1ab69cb599153f8b2776862fc5419db8c2607b681b22d6a0a

  • SHA512

    d70e03f5fd200fb5d19cbe715ceef13d2f204dfaa448f20ee4a2cecde63989319f7fb5e95074c5ac5dcb9a7d1fe6d995cca307d3437bd46d75825547e53f8305

  • SSDEEP

    393216:RxIP2xWyj39n4ryMcrgYRfcg5E/Jeqs+N3CsAs/2xQv2zQ2cYML+:PIP2xjzgYRfcQE/JU+BCsvDsQ2I6

Malware Config

Targets

    • Target

      0c9530f09cc891b40baa4c5b97487afd_JaffaCakes118

    • Size

      17.0MB

    • MD5

      0c9530f09cc891b40baa4c5b97487afd

    • SHA1

      e0db7762db516d9604a74be5a4d08919a18e57b7

    • SHA256

      50127e2ddc9b5aa1ab69cb599153f8b2776862fc5419db8c2607b681b22d6a0a

    • SHA512

      d70e03f5fd200fb5d19cbe715ceef13d2f204dfaa448f20ee4a2cecde63989319f7fb5e95074c5ac5dcb9a7d1fe6d995cca307d3437bd46d75825547e53f8305

    • SSDEEP

      393216:RxIP2xWyj39n4ryMcrgYRfcg5E/Jeqs+N3CsAs/2xQv2zQ2cYML+:PIP2xjzgYRfcQE/JU+BCsvDsQ2I6

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks