General

  • Target

    46dc32805278cff490d3a281ba4e5521_JaffaCakes118

  • Size

    6.7MB

  • Sample

    241015-kv1m3svhkf

  • MD5

    46dc32805278cff490d3a281ba4e5521

  • SHA1

    8ea1c2dda58ae1874f7c109b3405854c14e3778c

  • SHA256

    edf56078102735a0009cd302b2953dc345056adac914bd152a447ae7a8104c1e

  • SHA512

    fb04d715d3702c2e2ce04b31baf4667b2ed78c63550cbb3255bda5a3c19876065bd0b1920e292cb32c223a5aa88a3ffc40d92b33d5099363e7bf9123063464f7

  • SSDEEP

    196608:HkxLgXOYd+GDErH/vzV0YPNKphEV6U2qstRlduq1qgiL+EY:HvOYL4rvziYlKdtTd3zf

Malware Config

Targets

    • Target

      46dc32805278cff490d3a281ba4e5521_JaffaCakes118

    • Size

      6.7MB

    • MD5

      46dc32805278cff490d3a281ba4e5521

    • SHA1

      8ea1c2dda58ae1874f7c109b3405854c14e3778c

    • SHA256

      edf56078102735a0009cd302b2953dc345056adac914bd152a447ae7a8104c1e

    • SHA512

      fb04d715d3702c2e2ce04b31baf4667b2ed78c63550cbb3255bda5a3c19876065bd0b1920e292cb32c223a5aa88a3ffc40d92b33d5099363e7bf9123063464f7

    • SSDEEP

      196608:HkxLgXOYd+GDErH/vzV0YPNKphEV6U2qstRlduq1qgiL+EY:HvOYL4rvziYlKdtTd3zf

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks