General

  • Target

    66d4fa825bbe70d14290c8848d9a7e66_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240522-lp7d4sah63

  • MD5

    66d4fa825bbe70d14290c8848d9a7e66

  • SHA1

    8246c545ae513fa8712ffca4f1951937a03f50d4

  • SHA256

    a23f01237da72448b0a0db19668a8c308c4637522d7eaa785afb8ccb1aa33670

  • SHA512

    0d9277c0c6bbf7f2035bf523f231c79b088ba31277c1f88905f1393d9a5e4f2bd9e738945ee8ad6d028a0ad551c1fe575250bcb8d6380897cc0641586f1079d9

  • SSDEEP

    49152:Bq/aruWmUUqU2rLaUiSYDptOQmT12MtZmYTY:cSC1uLaiYDpgQm7VY

Malware Config

Targets

    • Target

      66d4fa825bbe70d14290c8848d9a7e66_JaffaCakes118

    • Size

      1.6MB

    • MD5

      66d4fa825bbe70d14290c8848d9a7e66

    • SHA1

      8246c545ae513fa8712ffca4f1951937a03f50d4

    • SHA256

      a23f01237da72448b0a0db19668a8c308c4637522d7eaa785afb8ccb1aa33670

    • SHA512

      0d9277c0c6bbf7f2035bf523f231c79b088ba31277c1f88905f1393d9a5e4f2bd9e738945ee8ad6d028a0ad551c1fe575250bcb8d6380897cc0641586f1079d9

    • SSDEEP

      49152:Bq/aruWmUUqU2rLaUiSYDptOQmT12MtZmYTY:cSC1uLaiYDpgQm7VY

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks