General

  • Target

    dd7d432730e9dd82aff36c4e3db4b75b_JaffaCakes118

  • Size

    6.7MB

  • Sample

    241210-hhsqlaslbq

  • MD5

    dd7d432730e9dd82aff36c4e3db4b75b

  • SHA1

    00b0683b456045ce6b8a264ede080f7b407c2679

  • SHA256

    f91e6c85fef73aebc7eb73edee75e96376618522a7bf0df952ac9087bc17782b

  • SHA512

    62841fd1fb3de9ec9ba93dd455b931d270b884591ffdf5998edfc6e3672aef01cbdd88ee79dd77bc644eef2d907e55a7d3e636d18b91044cbeee93356df98606

  • SSDEEP

    196608:uyxLsXOld+G3Hr0/v42DYPNcCx6NHUlpTAq1qqAzVGkxWR:uxOlLXOv48Ylcojste

Malware Config

Targets

    • Target

      dd7d432730e9dd82aff36c4e3db4b75b_JaffaCakes118

    • Size

      6.7MB

    • MD5

      dd7d432730e9dd82aff36c4e3db4b75b

    • SHA1

      00b0683b456045ce6b8a264ede080f7b407c2679

    • SHA256

      f91e6c85fef73aebc7eb73edee75e96376618522a7bf0df952ac9087bc17782b

    • SHA512

      62841fd1fb3de9ec9ba93dd455b931d270b884591ffdf5998edfc6e3672aef01cbdd88ee79dd77bc644eef2d907e55a7d3e636d18b91044cbeee93356df98606

    • SSDEEP

      196608:uyxLsXOld+G3Hr0/v42DYPNcCx6NHUlpTAq1qqAzVGkxWR:uxOlLXOv48Ylcojste

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks