General

  • Target

    4b17b1d55903b88ba4e2d3d5265dd2db_JaffaCakes118

  • Size

    18.8MB

  • Sample

    240516-prlf7sdc47

  • MD5

    4b17b1d55903b88ba4e2d3d5265dd2db

  • SHA1

    f96f865d11beed40145f154bd4dd1f6b640c81f5

  • SHA256

    ae3525ba798f08bce978c5eaeca8603ed133234155ccc7f515530441e6e1a529

  • SHA512

    8eaa7a3ad6860af3720425ec7b4555350eeec135ca6280a4831b9816a14298c88791b89ab9771e623484e3d18150bde09f44f0a5c14ec973a8ddfe1c5f47f5f8

  • SSDEEP

    393216:cbD0tU95H7NnUUL1cXyzD1TAnbGHRUxJ7KNUwzcwT2Fvlp6kXirzDrJdpG:cUqbRF8WMbwRUxJ7GUsHUv76kSrtdM

Malware Config

Targets

    • Target

      4b17b1d55903b88ba4e2d3d5265dd2db_JaffaCakes118

    • Size

      18.8MB

    • MD5

      4b17b1d55903b88ba4e2d3d5265dd2db

    • SHA1

      f96f865d11beed40145f154bd4dd1f6b640c81f5

    • SHA256

      ae3525ba798f08bce978c5eaeca8603ed133234155ccc7f515530441e6e1a529

    • SHA512

      8eaa7a3ad6860af3720425ec7b4555350eeec135ca6280a4831b9816a14298c88791b89ab9771e623484e3d18150bde09f44f0a5c14ec973a8ddfe1c5f47f5f8

    • SSDEEP

      393216:cbD0tU95H7NnUUL1cXyzD1TAnbGHRUxJ7KNUwzcwT2Fvlp6kXirzDrJdpG:cUqbRF8WMbwRUxJ7GUsHUv76kSrtdM

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks