General

  • Target

    b88c68fb1b8371690790754e86174c4d_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240617-pb32bazdqe

  • MD5

    b88c68fb1b8371690790754e86174c4d

  • SHA1

    7060f14dd89debe05b9aaf0af0553fdc6d1aa491

  • SHA256

    5b7f0d49cbee6864471297997b38c8aa3be1340e5d680478b9d5fcab630ad8c7

  • SHA512

    22086a355bf6ed3debca2ba5685571efead1c2038153a29ec2627f4746de9cf6dc5180c6573de33c76864417214f6057d9cbd08faf0b76e62a9b182b92729d7b

  • SSDEEP

    98304:S4I0D0zsxRduGVNU5uKE7Hd1U9Nxl8EuW5wdq9FPTLHet6Or5iAzP08sGK:S4bwAHdjVK5uKETbU9NxlUW5wY9FP2tU

Malware Config

Targets

    • Target

      b88c68fb1b8371690790754e86174c4d_JaffaCakes118

    • Size

      4.6MB

    • MD5

      b88c68fb1b8371690790754e86174c4d

    • SHA1

      7060f14dd89debe05b9aaf0af0553fdc6d1aa491

    • SHA256

      5b7f0d49cbee6864471297997b38c8aa3be1340e5d680478b9d5fcab630ad8c7

    • SHA512

      22086a355bf6ed3debca2ba5685571efead1c2038153a29ec2627f4746de9cf6dc5180c6573de33c76864417214f6057d9cbd08faf0b76e62a9b182b92729d7b

    • SSDEEP

      98304:S4I0D0zsxRduGVNU5uKE7Hd1U9Nxl8EuW5wdq9FPTLHet6Or5iAzP08sGK:S4bwAHdjVK5uKETbU9NxlUW5wY9FP2tU

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks