General

  • Target

    531469fedd0085f4d2471cbe11b53b38_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241017-w4wk9syejf

  • MD5

    531469fedd0085f4d2471cbe11b53b38

  • SHA1

    d50cf5c4d479934f224a1d21f338de487e50b7bd

  • SHA256

    6ffee7d16d48d1eb6472db7fc48f42f0423bfa791dab14c0f364cc85cbcf2ecb

  • SHA512

    6c118c9d2e9448b42d7275e7ef8b0ece36fe4976977fc58ecc7dbc179847a4f2dbf0f36b24470f4ec00f09b8900cb246ed7b8e74499918faa513fa1390b7bd11

  • SSDEEP

    49152:N44BjqDOIuTg7TaCo+3Mn4yAwieSlhs8IEPc7gB2VD6HThy9hrcppXTc:O4FqDtTsn4yAw4+8IEPc7gB2xQhy95cA

Malware Config

Targets

    • Target

      531469fedd0085f4d2471cbe11b53b38_JaffaCakes118

    • Size

      2.6MB

    • MD5

      531469fedd0085f4d2471cbe11b53b38

    • SHA1

      d50cf5c4d479934f224a1d21f338de487e50b7bd

    • SHA256

      6ffee7d16d48d1eb6472db7fc48f42f0423bfa791dab14c0f364cc85cbcf2ecb

    • SHA512

      6c118c9d2e9448b42d7275e7ef8b0ece36fe4976977fc58ecc7dbc179847a4f2dbf0f36b24470f4ec00f09b8900cb246ed7b8e74499918faa513fa1390b7bd11

    • SSDEEP

      49152:N44BjqDOIuTg7TaCo+3Mn4yAwieSlhs8IEPc7gB2VD6HThy9hrcppXTc:O4FqDtTsn4yAw4+8IEPc7gB2xQhy95cA

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks