General

  • Target

    530610bdc8ff48013317fefcf7876dc5_JaffaCakes118

  • Size

    257KB

  • Sample

    241017-wwktssyape

  • MD5

    530610bdc8ff48013317fefcf7876dc5

  • SHA1

    2e458e9d0f38707998f1d67fada9547ba9a3d023

  • SHA256

    70ea01d008463fb8cb32922eb46f7747ad8553bb0557e524ba9258388f6a3bde

  • SHA512

    1f0fb1606d3ada6d7857b248ad88b924d7597ea3aefe9abcde5255ba71e398a560c788ea3b1f9d5b787edee2d94c9e0bf58daa0a1f726398cf93dd8ad4b76a4b

  • SSDEEP

    6144:LFha3ha+mis4NbRG32tkrXwIJckat9SZEyEcAhBn+R9pxMN3oPa:Zhuho74tRGmerAIikQSZPxAj+xx4oPa

Malware Config

Targets

    • Target

      530610bdc8ff48013317fefcf7876dc5_JaffaCakes118

    • Size

      257KB

    • MD5

      530610bdc8ff48013317fefcf7876dc5

    • SHA1

      2e458e9d0f38707998f1d67fada9547ba9a3d023

    • SHA256

      70ea01d008463fb8cb32922eb46f7747ad8553bb0557e524ba9258388f6a3bde

    • SHA512

      1f0fb1606d3ada6d7857b248ad88b924d7597ea3aefe9abcde5255ba71e398a560c788ea3b1f9d5b787edee2d94c9e0bf58daa0a1f726398cf93dd8ad4b76a4b

    • SSDEEP

      6144:LFha3ha+mis4NbRG32tkrXwIJckat9SZEyEcAhBn+R9pxMN3oPa:Zhuho74tRGmerAIikQSZPxAj+xx4oPa

    Score
    7/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks