General

  • Target

    51d2ba374b48e37071567b3a5afc34e0_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241017-m6dzkaxhrr

  • MD5

    51d2ba374b48e37071567b3a5afc34e0

  • SHA1

    6a7b496e656c62cdfa5ede3c24f6bd989526f79b

  • SHA256

    fe61b67ac9859b8a03e4c6cfa63237b773040bb61ab713c8704cc7516a991e7b

  • SHA512

    16ede35e171b505ee8507e06c8d8bb6cc42feeaa920d4f89282bd9e56fbae04813a67227791652f8704f3598f408e7f175301c7353cca33ec0ee1124e31aaa63

  • SSDEEP

    49152:NP4gjcD44kHMwezgW2mC3xg3jtRpzNOfngFrgQnQPBR5UMow:Z4ScDEHMweshp32AgFriBrL

Malware Config

Targets

    • Target

      51d2ba374b48e37071567b3a5afc34e0_JaffaCakes118

    • Size

      2.6MB

    • MD5

      51d2ba374b48e37071567b3a5afc34e0

    • SHA1

      6a7b496e656c62cdfa5ede3c24f6bd989526f79b

    • SHA256

      fe61b67ac9859b8a03e4c6cfa63237b773040bb61ab713c8704cc7516a991e7b

    • SHA512

      16ede35e171b505ee8507e06c8d8bb6cc42feeaa920d4f89282bd9e56fbae04813a67227791652f8704f3598f408e7f175301c7353cca33ec0ee1124e31aaa63

    • SSDEEP

      49152:NP4gjcD44kHMwezgW2mC3xg3jtRpzNOfngFrgQnQPBR5UMow:Z4ScDEHMweshp32AgFriBrL

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks