General

  • Target

    63d3e0588dbb6ecd09706786d76ac056_JaffaCakes118

  • Size

    17.1MB

  • Sample

    240521-s434kaag9t

  • MD5

    63d3e0588dbb6ecd09706786d76ac056

  • SHA1

    d3497ab8f9d098c29c1669c52e81d0d3da5884c5

  • SHA256

    eb40eb2932f8bbcb5c9903a7bbbeb4d9f1a432914f3a6a24a2a1f182552089ed

  • SHA512

    4946c64a5a01a552c0ead0e4327f96dd0540afbe948696655c7613dd0b27c0537a7a4324eb7722694f7f7c7a5598d73bc31ae3ca8c59b13f1a7e324929a2e93c

  • SSDEEP

    393216:xEv4O0M6iEYWDwCF+GUjvB7ObhnFGaLR2tzuM/DxwPaEsjV:xEvXgYWEoyvdenFGaLR2tRdwzsR

Malware Config

Targets

    • Target

      63d3e0588dbb6ecd09706786d76ac056_JaffaCakes118

    • Size

      17.1MB

    • MD5

      63d3e0588dbb6ecd09706786d76ac056

    • SHA1

      d3497ab8f9d098c29c1669c52e81d0d3da5884c5

    • SHA256

      eb40eb2932f8bbcb5c9903a7bbbeb4d9f1a432914f3a6a24a2a1f182552089ed

    • SHA512

      4946c64a5a01a552c0ead0e4327f96dd0540afbe948696655c7613dd0b27c0537a7a4324eb7722694f7f7c7a5598d73bc31ae3ca8c59b13f1a7e324929a2e93c

    • SSDEEP

      393216:xEv4O0M6iEYWDwCF+GUjvB7ObhnFGaLR2tzuM/DxwPaEsjV:xEvXgYWEoyvdenFGaLR2tRdwzsR

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks