General

  • Target

    a7cec5677fd25edec6781d411643ccd7_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240614-dql6katame

  • MD5

    a7cec5677fd25edec6781d411643ccd7

  • SHA1

    e4a04ed9ead038303dae2a4bc252f4d89f081954

  • SHA256

    8d9c2679510fc88685494f9d43a2259efbed6526cd9375f5d34df03df6a9d0d4

  • SHA512

    5c553f41a74831dc1b0c2e5af1983892a9629bc37ec14eb9f8a59595b1a119ddc850bf9ec402991a07e4aabff4726ab114f3cd3828bc74fddc9c5995e27075a6

  • SSDEEP

    98304:S4I0D0zsxRduGVNU5uKE7Hd1U9Nxl8EuW5wdq9FPTLHet6Or5iAzP08sG6:S4bwAHdjVK5uKETbU9NxlUW5wY9FP2t4

Malware Config

Targets

    • Target

      a7cec5677fd25edec6781d411643ccd7_JaffaCakes118

    • Size

      4.6MB

    • MD5

      a7cec5677fd25edec6781d411643ccd7

    • SHA1

      e4a04ed9ead038303dae2a4bc252f4d89f081954

    • SHA256

      8d9c2679510fc88685494f9d43a2259efbed6526cd9375f5d34df03df6a9d0d4

    • SHA512

      5c553f41a74831dc1b0c2e5af1983892a9629bc37ec14eb9f8a59595b1a119ddc850bf9ec402991a07e4aabff4726ab114f3cd3828bc74fddc9c5995e27075a6

    • SSDEEP

      98304:S4I0D0zsxRduGVNU5uKE7Hd1U9Nxl8EuW5wdq9FPTLHet6Or5iAzP08sG6:S4bwAHdjVK5uKETbU9NxlUW5wY9FP2t4

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks