General

  • Target

    3cf1926754591bd9f09c90f7e6bc4f74_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241013-bb1djaverj

  • MD5

    3cf1926754591bd9f09c90f7e6bc4f74

  • SHA1

    1039618256094477022f6197e144bfd935194adc

  • SHA256

    546501cd37d117e14e9a0ab6410213dc7172ae76b43dccee638dda2242407b80

  • SHA512

    b65471955d54e24070aa10ebf7064751701d786b95b41fa07ca81e2b3d9836896e77066f6e2ed1cac1e2d244344369321683ae6f1c33203448e2b1e34ad8a17b

  • SSDEEP

    24576:uGuoyEk2P74ccXfkJ/DyAxMs6nUQUiRL3tlEmWCmyR8//if:uGubEzDsXgyWdQUih9hWCTR8//if

Malware Config

Targets

    • Target

      3cf1926754591bd9f09c90f7e6bc4f74_JaffaCakes118

    • Size

      1.1MB

    • MD5

      3cf1926754591bd9f09c90f7e6bc4f74

    • SHA1

      1039618256094477022f6197e144bfd935194adc

    • SHA256

      546501cd37d117e14e9a0ab6410213dc7172ae76b43dccee638dda2242407b80

    • SHA512

      b65471955d54e24070aa10ebf7064751701d786b95b41fa07ca81e2b3d9836896e77066f6e2ed1cac1e2d244344369321683ae6f1c33203448e2b1e34ad8a17b

    • SSDEEP

      24576:uGuoyEk2P74ccXfkJ/DyAxMs6nUQUiRL3tlEmWCmyR8//if:uGubEzDsXgyWdQUih9hWCTR8//if

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks