General

  • Target

    3afde5aece6457d6af55ab0d1609d625_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241012-tyk68szcmc

  • MD5

    3afde5aece6457d6af55ab0d1609d625

  • SHA1

    7d97c03e3f29e64e86a64ae9d910d179c798ad37

  • SHA256

    ac63fdbeb3ce538b71af1e6481f90385dd16ddeb43d4bc612c430ba86b3b8dc4

  • SHA512

    9682a191eff5fc5bc85cee0d92b29a5b190256a0d7ddf5d6147ff1e7ae031823cfd4ec0571258ed4397868d1873b8cfc897f400404c118f8eb336eb0bf6ae1d1

  • SSDEEP

    49152:NP4gjcD44kHMwezgW2mC3xg3jtRpzNOfngFrgQnQPBR5UMoE:Z4ScDEHMweshp32AgFriBrr

Malware Config

Targets

    • Target

      3afde5aece6457d6af55ab0d1609d625_JaffaCakes118

    • Size

      2.6MB

    • MD5

      3afde5aece6457d6af55ab0d1609d625

    • SHA1

      7d97c03e3f29e64e86a64ae9d910d179c798ad37

    • SHA256

      ac63fdbeb3ce538b71af1e6481f90385dd16ddeb43d4bc612c430ba86b3b8dc4

    • SHA512

      9682a191eff5fc5bc85cee0d92b29a5b190256a0d7ddf5d6147ff1e7ae031823cfd4ec0571258ed4397868d1873b8cfc897f400404c118f8eb336eb0bf6ae1d1

    • SSDEEP

      49152:NP4gjcD44kHMwezgW2mC3xg3jtRpzNOfngFrgQnQPBR5UMoE:Z4ScDEHMweshp32AgFriBrr

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks