General

  • Target

    ac9e93cab46e87019ffabed9baa15e74_JaffaCakes118

  • Size

    5.3MB

  • Sample

    240615-c5z6aswgpe

  • MD5

    ac9e93cab46e87019ffabed9baa15e74

  • SHA1

    063347e4f264731ec1b03535a9a014412d410878

  • SHA256

    9bfaf451ca585495c2f5a481d504f6c4d50d0299a65d0fea6889d3636d7b3c32

  • SHA512

    9afb6fc3ffa292a3e57b7e4f8a8278045609159e5955fef60910449f0b5d54ddd68052ef19248eff83f1282640d24321522069e418b5d6a0fbcfb473970b3e4c

  • SSDEEP

    98304:zjlVgSnddLmWytwJ6+rEkGjLkA9W3v40cw7FFpn0JEh8ZUKdr7GIqhDnGbIX+wDE:zjYSndZmQJ6wEkGfkQsFnyEGRfk2S+wg

Malware Config

Targets

    • Target

      ac9e93cab46e87019ffabed9baa15e74_JaffaCakes118

    • Size

      5.3MB

    • MD5

      ac9e93cab46e87019ffabed9baa15e74

    • SHA1

      063347e4f264731ec1b03535a9a014412d410878

    • SHA256

      9bfaf451ca585495c2f5a481d504f6c4d50d0299a65d0fea6889d3636d7b3c32

    • SHA512

      9afb6fc3ffa292a3e57b7e4f8a8278045609159e5955fef60910449f0b5d54ddd68052ef19248eff83f1282640d24321522069e418b5d6a0fbcfb473970b3e4c

    • SSDEEP

      98304:zjlVgSnddLmWytwJ6+rEkGjLkA9W3v40cw7FFpn0JEh8ZUKdr7GIqhDnGbIX+wDE:zjYSndZmQJ6wEkGfkQsFnyEGRfk2S+wg

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks