General

  • Target

    0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118

  • Size

    2.7MB

  • Sample

    241002-nhjqksxdnh

  • MD5

    0a6837bb31efd91ec8df1419587bfb5d

  • SHA1

    8eb24fe20470acac40b3ae406824ca12b4ca68a7

  • SHA256

    70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7

  • SHA512

    46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2

  • SSDEEP

    49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR

Malware Config

Targets

    • Target

      0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118

    • Size

      2.7MB

    • MD5

      0a6837bb31efd91ec8df1419587bfb5d

    • SHA1

      8eb24fe20470acac40b3ae406824ca12b4ca68a7

    • SHA256

      70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7

    • SHA512

      46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2

    • SSDEEP

      49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks