General

  • Target

    52b39d6d8a0646f86edce48a01638d13_JaffaCakes118

  • Size

    6.6MB

  • Sample

    241017-vcf6tsvfre

  • MD5

    52b39d6d8a0646f86edce48a01638d13

  • SHA1

    3dc1f330a4c74135c620388a2c738a2fd1f6e442

  • SHA256

    080b797741cb49cf3e45e9df7c3b03f4e1e2b7ba377a0077b09a3bf004d72e13

  • SHA512

    069a47d0382a8dd0e07a821196db331ed25dc235d3a9365074d08efcef46024b52c13248c7ea51fc24ecb202f0a570a667acf6b45eeb3a155dd18a83d37dad12

  • SSDEEP

    196608:TkxLAXOcd+G/Mr7/vXdkYPNORIwNiUGyuCGq1qoKik:TvOcLEHvXOYlOxzm

Malware Config

Targets

    • Target

      52b39d6d8a0646f86edce48a01638d13_JaffaCakes118

    • Size

      6.6MB

    • MD5

      52b39d6d8a0646f86edce48a01638d13

    • SHA1

      3dc1f330a4c74135c620388a2c738a2fd1f6e442

    • SHA256

      080b797741cb49cf3e45e9df7c3b03f4e1e2b7ba377a0077b09a3bf004d72e13

    • SHA512

      069a47d0382a8dd0e07a821196db331ed25dc235d3a9365074d08efcef46024b52c13248c7ea51fc24ecb202f0a570a667acf6b45eeb3a155dd18a83d37dad12

    • SSDEEP

      196608:TkxLAXOcd+G/Mr7/vXdkYPNORIwNiUGyuCGq1qoKik:TvOcLEHvXOYlOxzm

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks