General

  • Target

    527fea1558daa57b405f858d82a5826e_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241017-sscr8ssfle

  • MD5

    527fea1558daa57b405f858d82a5826e

  • SHA1

    b22b05999c50c2a7940a7610ff066be9b08970ce

  • SHA256

    ef16e5b99f0809d749417ce067bee383c31700e197e2e649847d422be965c2ad

  • SHA512

    537a025eef35da1d9a9fbf89494c4e49e0156b68c683b5f3ec4744991e5c204146cbf92de4910100fd2c66977b6c64db24f2fd87d01f762c4aceaea90a62accc

  • SSDEEP

    49152:N44BjqDOIuTg7TaCo+3Mn4yAwieSlhs8IEPc7gB2VD6HThy9hrcppXTx:O4FqDtTsn4yAw4+8IEPc7gB2xQhy95cF

Malware Config

Targets

    • Target

      527fea1558daa57b405f858d82a5826e_JaffaCakes118

    • Size

      2.6MB

    • MD5

      527fea1558daa57b405f858d82a5826e

    • SHA1

      b22b05999c50c2a7940a7610ff066be9b08970ce

    • SHA256

      ef16e5b99f0809d749417ce067bee383c31700e197e2e649847d422be965c2ad

    • SHA512

      537a025eef35da1d9a9fbf89494c4e49e0156b68c683b5f3ec4744991e5c204146cbf92de4910100fd2c66977b6c64db24f2fd87d01f762c4aceaea90a62accc

    • SSDEEP

      49152:N44BjqDOIuTg7TaCo+3Mn4yAwieSlhs8IEPc7gB2VD6HThy9hrcppXTx:O4FqDtTsn4yAw4+8IEPc7gB2xQhy95cF

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks