General

  • Target

    9f5eaa891b0e5baadd2107b6326b8269_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240611-yq5ccszbqh

  • MD5

    9f5eaa891b0e5baadd2107b6326b8269

  • SHA1

    67e8293c818d131d5d370125bf967f56eaac7d16

  • SHA256

    1f46f3096343c54f47dc417b8434a072248ffcd33913d73586e2103849434a25

  • SHA512

    f4a7bcf6250672f20a346c092187649ff8b641dcbc3595ad443b156b7cf7c29e97c9d9832180a17ca133b14eda9d7d945e214801e9c2f20ec82eaba31182b294

  • SSDEEP

    49152:rd2A7z0MPsWBTjOh8yAobZhfpu6YT7BV08Qa:rFz0M1jQ8UZynPBV0S

Malware Config

Targets

    • Target

      9f5eaa891b0e5baadd2107b6326b8269_JaffaCakes118

    • Size

      2.0MB

    • MD5

      9f5eaa891b0e5baadd2107b6326b8269

    • SHA1

      67e8293c818d131d5d370125bf967f56eaac7d16

    • SHA256

      1f46f3096343c54f47dc417b8434a072248ffcd33913d73586e2103849434a25

    • SHA512

      f4a7bcf6250672f20a346c092187649ff8b641dcbc3595ad443b156b7cf7c29e97c9d9832180a17ca133b14eda9d7d945e214801e9c2f20ec82eaba31182b294

    • SSDEEP

      49152:rd2A7z0MPsWBTjOh8yAobZhfpu6YT7BV08Qa:rFz0M1jQ8UZynPBV0S

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks