General

  • Target

    6ef721dd530e24eae3662194e7e371f8_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240524-srw5gsag45

  • MD5

    6ef721dd530e24eae3662194e7e371f8

  • SHA1

    8fd061641128b13c275fc1376950f228e87d831a

  • SHA256

    963129a209c72c1443680542427e4d02b238eae3799f0774c1242ef3dbe7301f

  • SHA512

    b46ca6d6b2bddb48293bf3d716623dcfa2e50af032167a9fe5c8d64a7201a72e3edbb547775a1999178b0580d8498ec6c9d375ce9c45b06e228972a0e30a8665

  • SSDEEP

    49152:DbLioqGu4BW0qcwBnO8wAUYDptOQmT12MQZmY+e:DfcsScK1HUYDpgQm7De

Malware Config

Targets

    • Target

      6ef721dd530e24eae3662194e7e371f8_JaffaCakes118

    • Size

      1.6MB

    • MD5

      6ef721dd530e24eae3662194e7e371f8

    • SHA1

      8fd061641128b13c275fc1376950f228e87d831a

    • SHA256

      963129a209c72c1443680542427e4d02b238eae3799f0774c1242ef3dbe7301f

    • SHA512

      b46ca6d6b2bddb48293bf3d716623dcfa2e50af032167a9fe5c8d64a7201a72e3edbb547775a1999178b0580d8498ec6c9d375ce9c45b06e228972a0e30a8665

    • SSDEEP

      49152:DbLioqGu4BW0qcwBnO8wAUYDptOQmT12MQZmY+e:DfcsScK1HUYDpgQm7De

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks