General

  • Target

    30d0d77a7b4ec5bf0577f4081d07f8b7_JaffaCakes118

  • Size

    11.4MB

  • Sample

    241010-tvh8gavcrd

  • MD5

    30d0d77a7b4ec5bf0577f4081d07f8b7

  • SHA1

    a27e70c471162b5bc605c28f351222fb0d190c70

  • SHA256

    8b30cc0780f6ad9245aaf28fbd517e98cda6c785dc2be1fcf1bcc4090527084b

  • SHA512

    ff26b7580b0393f49d9944d109b37d3799b9e820adf99e38fb3b4ade26f21ab8e09c6444602c6ee9c4fee1eab3fb2a08eff2a0bd93fe923a8f17de83fccc32a2

  • SSDEEP

    196608:iiVy4gUnOtSDdgMGVsOfcssx9XVdhjsMmbg8D8Ylckzy94CxIsNuGGke1fOp6nFv:iP4OShbfvDPm8ckGCS8uxDn59U05xYhy

Malware Config

Targets

    • Target

      30d0d77a7b4ec5bf0577f4081d07f8b7_JaffaCakes118

    • Size

      11.4MB

    • MD5

      30d0d77a7b4ec5bf0577f4081d07f8b7

    • SHA1

      a27e70c471162b5bc605c28f351222fb0d190c70

    • SHA256

      8b30cc0780f6ad9245aaf28fbd517e98cda6c785dc2be1fcf1bcc4090527084b

    • SHA512

      ff26b7580b0393f49d9944d109b37d3799b9e820adf99e38fb3b4ade26f21ab8e09c6444602c6ee9c4fee1eab3fb2a08eff2a0bd93fe923a8f17de83fccc32a2

    • SSDEEP

      196608:iiVy4gUnOtSDdgMGVsOfcssx9XVdhjsMmbg8D8Ylckzy94CxIsNuGGke1fOp6nFv:iP4OShbfvDPm8ckGCS8uxDn59U05xYhy

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks