General

  • Target

    159be9a54de7e852e63d9afc0e928b80_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240627-l7vs2aycjp

  • MD5

    159be9a54de7e852e63d9afc0e928b80

  • SHA1

    d6518377328fa507c6578b25bd2120a1020b1a4c

  • SHA256

    2d5af4e0979bf2c3ac8c61bcf592d25073fd87acd4343d450013ea42090d765e

  • SHA512

    ea6fefad5911075a3bc3713494f55ad8f6f2364addda1a3cffa7cd438eaf54279d1539ae17cb99690b90636ea4c22ac7eeebbd11c7ec0939d2f3b8a73197ac31

  • SSDEEP

    49152:72ylyJ438KRDqeoIw+Z9AShi/TnRSvasyUW:7zwJ438KSLiyRSvaj

Malware Config

Targets

    • Target

      159be9a54de7e852e63d9afc0e928b80_JaffaCakes118

    • Size

      1.6MB

    • MD5

      159be9a54de7e852e63d9afc0e928b80

    • SHA1

      d6518377328fa507c6578b25bd2120a1020b1a4c

    • SHA256

      2d5af4e0979bf2c3ac8c61bcf592d25073fd87acd4343d450013ea42090d765e

    • SHA512

      ea6fefad5911075a3bc3713494f55ad8f6f2364addda1a3cffa7cd438eaf54279d1539ae17cb99690b90636ea4c22ac7eeebbd11c7ec0939d2f3b8a73197ac31

    • SSDEEP

      49152:72ylyJ438KRDqeoIw+Z9AShi/TnRSvasyUW:7zwJ438KSLiyRSvaj

    Score
    7/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks