General

  • Target

    52a154f5d9b73a9588885d8c80eb71f5_JaffaCakes118

  • Size

    2.9MB

  • Sample

    241017-tz9k8axgjr

  • MD5

    52a154f5d9b73a9588885d8c80eb71f5

  • SHA1

    42520897f5445ac5500128a13d9b496cab8ff392

  • SHA256

    aae892b25535148adf57cbd96b8347975efe6ae836de5b87478aedf9680382e1

  • SHA512

    9a9119e7a34e9d84bd2f9d4a15ee89d5830327af9e3d7e504c81a206d33602ee4a571fb94df5e10dcfeb5cfb119ce8f40e537289d3645c557dd2ab064b8d6495

  • SSDEEP

    49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHP:X4ByD8PDc8qjIUVmOYy+A9whgHP

Malware Config

Targets

    • Target

      52a154f5d9b73a9588885d8c80eb71f5_JaffaCakes118

    • Size

      2.9MB

    • MD5

      52a154f5d9b73a9588885d8c80eb71f5

    • SHA1

      42520897f5445ac5500128a13d9b496cab8ff392

    • SHA256

      aae892b25535148adf57cbd96b8347975efe6ae836de5b87478aedf9680382e1

    • SHA512

      9a9119e7a34e9d84bd2f9d4a15ee89d5830327af9e3d7e504c81a206d33602ee4a571fb94df5e10dcfeb5cfb119ce8f40e537289d3645c557dd2ab064b8d6495

    • SSDEEP

      49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHP:X4ByD8PDc8qjIUVmOYy+A9whgHP

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks