General

  • Target

    a34ef1203eeb938aa5d24b9f92f8de0d_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240613-bj35dsydlb

  • MD5

    a34ef1203eeb938aa5d24b9f92f8de0d

  • SHA1

    34b4c546cfea977e146dbb5d91baff1b53553981

  • SHA256

    83c79e39a585775d0394062241e5655f9f91796b4529643567798f392d13cf66

  • SHA512

    cdd710c7146f3e014bf782a354dd121e4a5fd9861c1d361b047c564dc78da13d2b3d16f011ee40a20873f8bd33c94e58a8fa69fb6e967029c7f679cb2c5ab4e3

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DQ:pn/I5It9fFhhlkcBKTHjZUKV86w7w4Gk

Malware Config

Targets

    • Target

      a34ef1203eeb938aa5d24b9f92f8de0d_JaffaCakes118

    • Size

      4.6MB

    • MD5

      a34ef1203eeb938aa5d24b9f92f8de0d

    • SHA1

      34b4c546cfea977e146dbb5d91baff1b53553981

    • SHA256

      83c79e39a585775d0394062241e5655f9f91796b4529643567798f392d13cf66

    • SHA512

      cdd710c7146f3e014bf782a354dd121e4a5fd9861c1d361b047c564dc78da13d2b3d16f011ee40a20873f8bd33c94e58a8fa69fb6e967029c7f679cb2c5ab4e3

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DQ:pn/I5It9fFhhlkcBKTHjZUKV86w7w4Gk

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks