General

  • Target

    3de1c0b179b781469331f6aa45a78cde_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240514-e44s7sbd58

  • MD5

    3de1c0b179b781469331f6aa45a78cde

  • SHA1

    09c332c4ba536dfda786aec6429097f8aff734d0

  • SHA256

    7b39b1649f6026d7efe3c3fc849530b212bc955f0520c1e241486cdbf0f6b243

  • SHA512

    df9ac91072a780eeec0284e54a9006bb8dff1525c17f7daac0bc88d8a5234a52a7ea3ae49d1413a981590c3ec3cce7c35d13341763a1260477348879a687c030

  • SSDEEP

    98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOR:w47sU96cv/i1Sc9800ong5kdnhyF9wE

Malware Config

Targets

    • Target

      3de1c0b179b781469331f6aa45a78cde_JaffaCakes118

    • Size

      4.6MB

    • MD5

      3de1c0b179b781469331f6aa45a78cde

    • SHA1

      09c332c4ba536dfda786aec6429097f8aff734d0

    • SHA256

      7b39b1649f6026d7efe3c3fc849530b212bc955f0520c1e241486cdbf0f6b243

    • SHA512

      df9ac91072a780eeec0284e54a9006bb8dff1525c17f7daac0bc88d8a5234a52a7ea3ae49d1413a981590c3ec3cce7c35d13341763a1260477348879a687c030

    • SSDEEP

      98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOR:w47sU96cv/i1Sc9800ong5kdnhyF9wE

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks