General

  • Target

    a45e9996d5673816ef03b1358c921d89_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240613-h18vjayeqg

  • MD5

    a45e9996d5673816ef03b1358c921d89

  • SHA1

    bfe9c200fb979965d2cbb23a113d90cfc89fddaa

  • SHA256

    d06182a075410061e1d610ca4f77a569dc076b3b600458c5e566f83a01ced722

  • SHA512

    ef2b008ebe59d18a6ae5d23a9e95fb4970b9af862d78bd4b8d43b136e295700aa22155d6b744bfdc5502b076cc29c1e62cfd4e8ca67ce29f040ae926446c8146

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DW:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GK

Malware Config

Targets

    • Target

      a45e9996d5673816ef03b1358c921d89_JaffaCakes118

    • Size

      4.6MB

    • MD5

      a45e9996d5673816ef03b1358c921d89

    • SHA1

      bfe9c200fb979965d2cbb23a113d90cfc89fddaa

    • SHA256

      d06182a075410061e1d610ca4f77a569dc076b3b600458c5e566f83a01ced722

    • SHA512

      ef2b008ebe59d18a6ae5d23a9e95fb4970b9af862d78bd4b8d43b136e295700aa22155d6b744bfdc5502b076cc29c1e62cfd4e8ca67ce29f040ae926446c8146

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DW:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GK

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks