General

  • Target

    b1ba34451ecdc4804ddaf52fa502333b_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240616-e4h7hazcna

  • MD5

    b1ba34451ecdc4804ddaf52fa502333b

  • SHA1

    6f8f3c809c9c0202d8fadef80a4f14b305766dd9

  • SHA256

    88bf248a9f5d8ccc6a42f4d77651212ed5959a76770a96ae23e97359874bcd6e

  • SHA512

    0e92bc4758ade3b213ed83605070aa1320715dcbdd1b1db7d7b6f0a144a5001bf00950fe9b2e98eb1b3ec1d8dbde5cdf8ab4c86ba9d517c61480a304e2e5bd98

  • SSDEEP

    49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034A0:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ79

Malware Config

Targets

    • Target

      b1ba34451ecdc4804ddaf52fa502333b_JaffaCakes118

    • Size

      2.6MB

    • MD5

      b1ba34451ecdc4804ddaf52fa502333b

    • SHA1

      6f8f3c809c9c0202d8fadef80a4f14b305766dd9

    • SHA256

      88bf248a9f5d8ccc6a42f4d77651212ed5959a76770a96ae23e97359874bcd6e

    • SHA512

      0e92bc4758ade3b213ed83605070aa1320715dcbdd1b1db7d7b6f0a144a5001bf00950fe9b2e98eb1b3ec1d8dbde5cdf8ab4c86ba9d517c61480a304e2e5bd98

    • SSDEEP

      49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034A0:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ79

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks