General

  • Target

    87bf01a404083758a702c1d85f5f452c_JaffaCakes118

  • Size

    41.8MB

  • Sample

    241102-zxvxyaykar

  • MD5

    87bf01a404083758a702c1d85f5f452c

  • SHA1

    5b9367d7c24d239f46a435bcbe8fa9e80563c8c3

  • SHA256

    ce6ff92f592646059126bfccaf433bb1ac3301dd07265d4bd4c6e4a7ce05115f

  • SHA512

    1cf9ed0064a9b3ea59cab66e0ebf341184ff1b927c46fb06f559f189b42f08d1f90cb294da44236bae06f0c206e64c01fe2dc95f6c667a381e04a481964cc742

  • SSDEEP

    786432:phCAr/Q0s2ROoHzNs3YX7xsAULlbKJ8u43toZaD3FSmZ94PVXKztKqWn:phCATXs2RhNsoX7vULlb3LD3FSY94x2i

Malware Config

Targets

    • Target

      87bf01a404083758a702c1d85f5f452c_JaffaCakes118

    • Size

      41.8MB

    • MD5

      87bf01a404083758a702c1d85f5f452c

    • SHA1

      5b9367d7c24d239f46a435bcbe8fa9e80563c8c3

    • SHA256

      ce6ff92f592646059126bfccaf433bb1ac3301dd07265d4bd4c6e4a7ce05115f

    • SHA512

      1cf9ed0064a9b3ea59cab66e0ebf341184ff1b927c46fb06f559f189b42f08d1f90cb294da44236bae06f0c206e64c01fe2dc95f6c667a381e04a481964cc742

    • SSDEEP

      786432:phCAr/Q0s2ROoHzNs3YX7xsAULlbKJ8u43toZaD3FSmZ94PVXKztKqWn:phCATXs2RhNsoX7vULlb3LD3FSY94x2i

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Target

      gamebox.apk

    • Size

      1.7MB

    • MD5

      fc76d2f2593de86bfb1e3f030b37e6fa

    • SHA1

      e27026a53a51a0823c8d4eb6b70b4d6377f530f5

    • SHA256

      913d4d664cd5872f03470505f751ed1e303531d1c667497d297923acc01409fd

    • SHA512

      b8a510ac6d45998e21be3d817df091123e21d73695b2059f1510491e6be818e299a80aa9b53d914f7d1160e9e920211acdfc79054360e989d366270b050a7df0

    • SSDEEP

      49152:N2AtOK4P7HSB1IhZNQwfyeq552L6YBoru:N2iOK48+hZNu5EmYMu

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks