General

  • Target

    37a7279ef458a5a52d308742a9951736_JaffaCakes118

  • Size

    1.9MB

  • Sample

    241012-a7jj8atcmf

  • MD5

    37a7279ef458a5a52d308742a9951736

  • SHA1

    5887413c609541b6a89b9eb0bab2a238103bc533

  • SHA256

    44d192ab5d1265a9815e61939ff2d25d731c5e4787b77bfae9cd3a76bd62f57c

  • SHA512

    1d3ff0ae17386db0dc64cbe0dc751637f3932cec0364c01ff70c9b86a6e5d8f2838cf24e085a9a4044ceabb4e3fcd656794489bdba127615f5bc29814ff39369

  • SSDEEP

    49152:yoAnyEEUPX250BnRb619xu1g4SoQug3SLxv1/VsJyiLs:q3X25snu9xsxSD9ifVGtg

Malware Config

Targets

    • Target

      37a7279ef458a5a52d308742a9951736_JaffaCakes118

    • Size

      1.9MB

    • MD5

      37a7279ef458a5a52d308742a9951736

    • SHA1

      5887413c609541b6a89b9eb0bab2a238103bc533

    • SHA256

      44d192ab5d1265a9815e61939ff2d25d731c5e4787b77bfae9cd3a76bd62f57c

    • SHA512

      1d3ff0ae17386db0dc64cbe0dc751637f3932cec0364c01ff70c9b86a6e5d8f2838cf24e085a9a4044ceabb4e3fcd656794489bdba127615f5bc29814ff39369

    • SSDEEP

      49152:yoAnyEEUPX250BnRb619xu1g4SoQug3SLxv1/VsJyiLs:q3X25snu9xsxSD9ifVGtg

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.