General

  • Target

    c771ff9ca5f404246aaad5a1e791d0b8_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240828-xjrbgssepl

  • MD5

    c771ff9ca5f404246aaad5a1e791d0b8

  • SHA1

    808223749c9b8a8396b4a02b5ca698ccb8abd7f1

  • SHA256

    84cf5e1960d87d19636aa0c7dc76ab824f346948cc8f5b34786c012b5ae27d6e

  • SHA512

    3ac71c941856c8b11836569ccb5c4367f0604ee394c1b596be543886202c16bbb0ea6af950cca371186ca31e130c9dac2e77f2ca25a09feb5ebaf74977cd8c30

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6D0:pn/I5It9fFhhlkcBKTHjZUKV86w7w4Gw

Malware Config

Targets

    • Target

      c771ff9ca5f404246aaad5a1e791d0b8_JaffaCakes118

    • Size

      4.6MB

    • MD5

      c771ff9ca5f404246aaad5a1e791d0b8

    • SHA1

      808223749c9b8a8396b4a02b5ca698ccb8abd7f1

    • SHA256

      84cf5e1960d87d19636aa0c7dc76ab824f346948cc8f5b34786c012b5ae27d6e

    • SHA512

      3ac71c941856c8b11836569ccb5c4367f0604ee394c1b596be543886202c16bbb0ea6af950cca371186ca31e130c9dac2e77f2ca25a09feb5ebaf74977cd8c30

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6D0:pn/I5It9fFhhlkcBKTHjZUKV86w7w4Gw

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks