General

  • Target

    b84ce030d8c998ea2a1db8a7af54c01a_JaffaCakes118

  • Size

    20.9MB

  • Sample

    240617-narffsyakh

  • MD5

    b84ce030d8c998ea2a1db8a7af54c01a

  • SHA1

    d3d8dd46be434fb4d7d78118ae1462332ff00690

  • SHA256

    fe27e14865a14f34bb284aaf66b64be5ebcb1d6c386f4a1685500383b26c37d9

  • SHA512

    caa26780f4e7280dae3b3f20dcd75c3cae8ba971cfe0bd94b82724a4eac75bde62ae7e206bfb1df6155685e2df70c558008fdbfc9f2bc869afe8e77c63e695cc

  • SSDEEP

    393216:KAk4q3W+pbDdSfyxQJjKrysoIJHRj51Y7D5KTM6/kMPT+ibrnBD8wbqGF:KAk4Mp9g3u/Rj5aaHPTDXnrbq0

Malware Config

Targets

    • Target

      b84ce030d8c998ea2a1db8a7af54c01a_JaffaCakes118

    • Size

      20.9MB

    • MD5

      b84ce030d8c998ea2a1db8a7af54c01a

    • SHA1

      d3d8dd46be434fb4d7d78118ae1462332ff00690

    • SHA256

      fe27e14865a14f34bb284aaf66b64be5ebcb1d6c386f4a1685500383b26c37d9

    • SHA512

      caa26780f4e7280dae3b3f20dcd75c3cae8ba971cfe0bd94b82724a4eac75bde62ae7e206bfb1df6155685e2df70c558008fdbfc9f2bc869afe8e77c63e695cc

    • SSDEEP

      393216:KAk4q3W+pbDdSfyxQJjKrysoIJHRj51Y7D5KTM6/kMPT+ibrnBD8wbqGF:KAk4Mp9g3u/Rj5aaHPTDXnrbq0

    Score
    8/10
    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks