General

  • Target

    53d1448de61365a6a1924d329876d6b9_JaffaCakes118

  • Size

    4.7MB

  • Sample

    241017-1a7hwszhjp

  • MD5

    53d1448de61365a6a1924d329876d6b9

  • SHA1

    ee82f9b5d086771959dabc899860b77a79e54451

  • SHA256

    ea00293af9be1f6a8dababd045d866b6b586ddb45589ab7afbec5d46809cd408

  • SHA512

    c4175050e4d61058b62730fc035d36b20df33e837b69b173b3ef912bc2a2a210d99e439b8127471ff1daf27effeb00a7ec6a059ff009cce62d33a0609ddf57ec

  • SSDEEP

    98304:n45uD+OL72QvP7emxG4gst/29Go1M3PXgk1k/0ojm32Js93bnnyzJ:n4clL6ySmo22413Rk8R3GU3bu

Malware Config

Targets

    • Target

      53d1448de61365a6a1924d329876d6b9_JaffaCakes118

    • Size

      4.7MB

    • MD5

      53d1448de61365a6a1924d329876d6b9

    • SHA1

      ee82f9b5d086771959dabc899860b77a79e54451

    • SHA256

      ea00293af9be1f6a8dababd045d866b6b586ddb45589ab7afbec5d46809cd408

    • SHA512

      c4175050e4d61058b62730fc035d36b20df33e837b69b173b3ef912bc2a2a210d99e439b8127471ff1daf27effeb00a7ec6a059ff009cce62d33a0609ddf57ec

    • SSDEEP

      98304:n45uD+OL72QvP7emxG4gst/29Go1M3PXgk1k/0ojm32Js93bnnyzJ:n4clL6ySmo22413Rk8R3GU3bu

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks