General

  • Target

    52b6db2c04a04e316c1aa8fee122e753_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241017-vd9vjavgqb

  • MD5

    52b6db2c04a04e316c1aa8fee122e753

  • SHA1

    bf127b46d78dde2c86325939ebbd20ed187464e2

  • SHA256

    a887f5a8629725f6c8704e0784be357fe2ff2e45900e0ac5ce8b652d7d813339

  • SHA512

    8835f370a509e1472792c94ce3864d4955e5ce21819c8a78f2a442ef0f70c0ddc38614f87a82bfca5afddd0ea6b1d6f42661fdbaa6eecdd4e4dd295adcdced0c

  • SSDEEP

    98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOi:w47sU96cv/i1Sc9800ong5kdnhyF9w3

Malware Config

Targets

    • Target

      52b6db2c04a04e316c1aa8fee122e753_JaffaCakes118

    • Size

      4.6MB

    • MD5

      52b6db2c04a04e316c1aa8fee122e753

    • SHA1

      bf127b46d78dde2c86325939ebbd20ed187464e2

    • SHA256

      a887f5a8629725f6c8704e0784be357fe2ff2e45900e0ac5ce8b652d7d813339

    • SHA512

      8835f370a509e1472792c94ce3864d4955e5ce21819c8a78f2a442ef0f70c0ddc38614f87a82bfca5afddd0ea6b1d6f42661fdbaa6eecdd4e4dd295adcdced0c

    • SSDEEP

      98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOi:w47sU96cv/i1Sc9800ong5kdnhyF9w3

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks