General

  • Target

    51a18dcb0d110b17391d007d8f4e5dd0_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241017-lxv12swcnr

  • MD5

    51a18dcb0d110b17391d007d8f4e5dd0

  • SHA1

    b1f88e9a338dfaa6e3972a42023ed992e615d8c6

  • SHA256

    3a145fd2188869ea7d0cb10adf13f68b09987cdd0b86297cc2228b806e5a41f3

  • SHA512

    67d9693ce0e3640f94e57bb8f0fc66fb40d194176deca62299f591b24cbdd7b0d8d906249eeabd309bf43427deed4e169f070d3a7ac7fc67711900412a40c962

  • SSDEEP

    98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOV:w47sU96cv/i1Sc9800ong5kdnhyF9wQ

Malware Config

Targets

    • Target

      51a18dcb0d110b17391d007d8f4e5dd0_JaffaCakes118

    • Size

      4.6MB

    • MD5

      51a18dcb0d110b17391d007d8f4e5dd0

    • SHA1

      b1f88e9a338dfaa6e3972a42023ed992e615d8c6

    • SHA256

      3a145fd2188869ea7d0cb10adf13f68b09987cdd0b86297cc2228b806e5a41f3

    • SHA512

      67d9693ce0e3640f94e57bb8f0fc66fb40d194176deca62299f591b24cbdd7b0d8d906249eeabd309bf43427deed4e169f070d3a7ac7fc67711900412a40c962

    • SSDEEP

      98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOV:w47sU96cv/i1Sc9800ong5kdnhyF9wQ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks