General

  • Target

    465dce78351bbeeba1ee542183fbd4ef_JaffaCakes118

  • Size

    2.9MB

  • Sample

    241015-hp5zha1bjh

  • MD5

    465dce78351bbeeba1ee542183fbd4ef

  • SHA1

    b8c24224f779d3eb41288dec5b48be639165988b

  • SHA256

    3bc536541efded64dfebf4fa75444cd6332cc900bbcc827b1e51d9328e9d0d4b

  • SHA512

    5bf66256f5026d6951ba8899684468842944454af439f7a4b4514f0059a099274e0f44f1a36ebbd57e896bcb509682e9f5f4e943d2e216ff7f52b1f06ef5ba7f

  • SSDEEP

    49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHw:X4ByD8PDc8qjIUVmOYy+A9whgHw

Malware Config

Targets

    • Target

      465dce78351bbeeba1ee542183fbd4ef_JaffaCakes118

    • Size

      2.9MB

    • MD5

      465dce78351bbeeba1ee542183fbd4ef

    • SHA1

      b8c24224f779d3eb41288dec5b48be639165988b

    • SHA256

      3bc536541efded64dfebf4fa75444cd6332cc900bbcc827b1e51d9328e9d0d4b

    • SHA512

      5bf66256f5026d6951ba8899684468842944454af439f7a4b4514f0059a099274e0f44f1a36ebbd57e896bcb509682e9f5f4e943d2e216ff7f52b1f06ef5ba7f

    • SSDEEP

      49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHw:X4ByD8PDc8qjIUVmOYy+A9whgHw

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks