General

  • Target

    51d81ded7ddebc8ad413888e6cdb8418_JaffaCakes118

  • Size

    31.0MB

  • Sample

    240517-2lxnhaeh86

  • MD5

    51d81ded7ddebc8ad413888e6cdb8418

  • SHA1

    354300f1daed5b7f00e537296042e3ccb67ebc0a

  • SHA256

    a8ee78344ecdecab87e8ae8a4308a1f02e072fd32734b3a52314a5ac285d7a7c

  • SHA512

    7b7ca2eab5c69a38ad0c89354e644dddaa34c58db88f79f9cd244863c5359332d611640775abfbcec98e44dfdfe13a4dd53b453fd8b689446d57090aaad89d07

  • SSDEEP

    786432:jO/URzPCW0wJ9wfpkw5xZH9tUyxlZkevUSr:q/URuWVrwfCwVbUUZjr

Malware Config

Targets

    • Target

      51d81ded7ddebc8ad413888e6cdb8418_JaffaCakes118

    • Size

      31.0MB

    • MD5

      51d81ded7ddebc8ad413888e6cdb8418

    • SHA1

      354300f1daed5b7f00e537296042e3ccb67ebc0a

    • SHA256

      a8ee78344ecdecab87e8ae8a4308a1f02e072fd32734b3a52314a5ac285d7a7c

    • SHA512

      7b7ca2eab5c69a38ad0c89354e644dddaa34c58db88f79f9cd244863c5359332d611640775abfbcec98e44dfdfe13a4dd53b453fd8b689446d57090aaad89d07

    • SSDEEP

      786432:jO/URzPCW0wJ9wfpkw5xZH9tUyxlZkevUSr:q/URuWVrwfCwVbUUZjr

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks