General

  • Target

    f4f3da8b0624d48527518fd2a71b23d3_JaffaCakes118

  • Size

    31.6MB

  • Sample

    240925-cqhbyasbqf

  • MD5

    f4f3da8b0624d48527518fd2a71b23d3

  • SHA1

    8553966588c18bb64e558b1630d4c78e7a72ac0d

  • SHA256

    660030b181c84a17b47e577ea66c98d9a81065453dbd86741494952cc54871f6

  • SHA512

    438db0f4aa8ac6724ae2261391150750713c91c1b1605285ed571eeb09a4cb5c1fcaf9e849122947bd5b707719208b397f79602cc79f07b291d0b1dd81a7bc0a

  • SSDEEP

    786432:X99abChYM+RAIDdRoDICBtLwPgMXY785g+N0Gh58ogY4ID/Mv5IJOOE5UY:X999XIDfoJLh9g5P2WIJ

Malware Config

Targets

    • Target

      f4f3da8b0624d48527518fd2a71b23d3_JaffaCakes118

    • Size

      31.6MB

    • MD5

      f4f3da8b0624d48527518fd2a71b23d3

    • SHA1

      8553966588c18bb64e558b1630d4c78e7a72ac0d

    • SHA256

      660030b181c84a17b47e577ea66c98d9a81065453dbd86741494952cc54871f6

    • SHA512

      438db0f4aa8ac6724ae2261391150750713c91c1b1605285ed571eeb09a4cb5c1fcaf9e849122947bd5b707719208b397f79602cc79f07b291d0b1dd81a7bc0a

    • SSDEEP

      786432:X99abChYM+RAIDdRoDICBtLwPgMXY785g+N0Gh58ogY4ID/Mv5IJOOE5UY:X999XIDfoJLh9g5P2WIJ

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Target

      MidasEmptyRes1.apk

    • Size

      5KB

    • MD5

      ea61a6cf8e8833e6181fe290d3255bb9

    • SHA1

      d1fc64d826b85c9cfbcc06fdeb7a01fc5437d873

    • SHA256

      a3c9e0815200dd3393499989525b95eace42f75c2be9f06c4b48a0d649d783ec

    • SHA512

      690c52c6ab0c8dce871ff23bde14723815a4bc607893f8ff5c5172228a1d955cddf6f8d12d3dde0104d1c92e3f9a0432707d322f8132b36c3827561b388f8896

    • SSDEEP

      96:dPG7WMxInKy+0E8AGtFvrPdOdAf56PgIDdy0QCGOf:JG6MxWtERGtFZfIDdQCxf

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks