General

  • Target

    2f7f28e4f5aff7868c2af2ff90365dc2_JaffaCakes118

  • Size

    15.0MB

  • Sample

    240510-rftpjsdc45

  • MD5

    2f7f28e4f5aff7868c2af2ff90365dc2

  • SHA1

    d2019190c845a406c70c2befefb1c649b7fcff81

  • SHA256

    a5e3cf4f32e3f630b57a0415ae50ca4620f188f74808ad509f96308c0c690250

  • SHA512

    3f509d7ecf0738f579d6c20b849cffdb810085021249ad0d19145b4300eefc95e31ebedf7237da471a285afd220fce83492ff175a22805358b861ede10d54577

  • SSDEEP

    393216:O4JmlU7D2uQKo1wnnNFj8uLnmbmF6XmkP+g04FJkWqtqCJRCA8:vBv559cmx2QECJYA8

Malware Config

Targets

    • Target

      2f7f28e4f5aff7868c2af2ff90365dc2_JaffaCakes118

    • Size

      15.0MB

    • MD5

      2f7f28e4f5aff7868c2af2ff90365dc2

    • SHA1

      d2019190c845a406c70c2befefb1c649b7fcff81

    • SHA256

      a5e3cf4f32e3f630b57a0415ae50ca4620f188f74808ad509f96308c0c690250

    • SHA512

      3f509d7ecf0738f579d6c20b849cffdb810085021249ad0d19145b4300eefc95e31ebedf7237da471a285afd220fce83492ff175a22805358b861ede10d54577

    • SSDEEP

      393216:O4JmlU7D2uQKo1wnnNFj8uLnmbmF6XmkP+g04FJkWqtqCJRCA8:vBv559cmx2QECJYA8

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks