General

  • Target

    990ea7f020b44d3f50effb638a372a0e_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240605-yfy3laff7x

  • MD5

    990ea7f020b44d3f50effb638a372a0e

  • SHA1

    cc1380d00d95645d9787c8705ffe39032907d64a

  • SHA256

    d067b5fbf17f4e6f411a10129d43366398ac1a61738ac9e322dca6d22660aed3

  • SHA512

    e4cc9afa540c5e3849cbdb29bd5d0f6609582e640add9d6e43f4daf0a72235fc129db37b8195167ed685ebe9c71845154135750497acd598f87a251ebba51c06

  • SSDEEP

    98304:V49HDGSDuTgd0Z79rcX1RJlahhddDi1WNC6USzOLQdDs3o7x7:V4dKG0Z79r2rehri1ue8sy7

Malware Config

Targets

    • Target

      990ea7f020b44d3f50effb638a372a0e_JaffaCakes118

    • Size

      4.6MB

    • MD5

      990ea7f020b44d3f50effb638a372a0e

    • SHA1

      cc1380d00d95645d9787c8705ffe39032907d64a

    • SHA256

      d067b5fbf17f4e6f411a10129d43366398ac1a61738ac9e322dca6d22660aed3

    • SHA512

      e4cc9afa540c5e3849cbdb29bd5d0f6609582e640add9d6e43f4daf0a72235fc129db37b8195167ed685ebe9c71845154135750497acd598f87a251ebba51c06

    • SSDEEP

      98304:V49HDGSDuTgd0Z79rcX1RJlahhddDi1WNC6USzOLQdDs3o7x7:V4dKG0Z79r2rehri1ue8sy7

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks