General

  • Target

    1381dc6e492fd46a42e84cfa97669ca0_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241004-qj13cswcql

  • MD5

    1381dc6e492fd46a42e84cfa97669ca0

  • SHA1

    50a188f8901d8ccdd30679b41b0440f8d410e137

  • SHA256

    d3a61f671879f4069c9bc008676fb5d0211f2531da59cee263992019e16e5494

  • SHA512

    3bf963f507588675f18a33d21eec10eca55ad86ef6f545d1fb53fc0986ef86e420313988454d4a1b600d2d420a6ab895c19dcb5718ad8f93f425c31319de63cd

  • SSDEEP

    49152:FW4AjjDqObFFjARViK+5CoDeDrLIFQc7zLeOpYMKw5OrB11xICVMKqVvb12:E4yjD/FVARrGm+LekYO5Or5xIC+v52

Malware Config

Targets

    • Target

      1381dc6e492fd46a42e84cfa97669ca0_JaffaCakes118

    • Size

      2.6MB

    • MD5

      1381dc6e492fd46a42e84cfa97669ca0

    • SHA1

      50a188f8901d8ccdd30679b41b0440f8d410e137

    • SHA256

      d3a61f671879f4069c9bc008676fb5d0211f2531da59cee263992019e16e5494

    • SHA512

      3bf963f507588675f18a33d21eec10eca55ad86ef6f545d1fb53fc0986ef86e420313988454d4a1b600d2d420a6ab895c19dcb5718ad8f93f425c31319de63cd

    • SSDEEP

      49152:FW4AjjDqObFFjARViK+5CoDeDrLIFQc7zLeOpYMKw5OrB11xICVMKqVvb12:E4yjD/FVARrGm+LekYO5Or5xIC+v52

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks