General

  • Target

    532f73a7da3dc050567903cfb83e72b8_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241017-xkn8hszemc

  • MD5

    532f73a7da3dc050567903cfb83e72b8

  • SHA1

    2dd491cdcb5a0418027d03c34fdb4d6058a826b5

  • SHA256

    175fc8ad5d12d48a2bec8ba9ac833d8c829f4744bc24aeea0300f2ea678705d6

  • SHA512

    eab879ee34df393f391f84da264ca2cb6f80b136637bccb467f15bd8241810bfa8a80423a6978569bf08957a56db61970dafca575ad150486fae2f3ecb056a86

  • SSDEEP

    49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034Af:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ7i

Malware Config

Targets

    • Target

      532f73a7da3dc050567903cfb83e72b8_JaffaCakes118

    • Size

      2.6MB

    • MD5

      532f73a7da3dc050567903cfb83e72b8

    • SHA1

      2dd491cdcb5a0418027d03c34fdb4d6058a826b5

    • SHA256

      175fc8ad5d12d48a2bec8ba9ac833d8c829f4744bc24aeea0300f2ea678705d6

    • SHA512

      eab879ee34df393f391f84da264ca2cb6f80b136637bccb467f15bd8241810bfa8a80423a6978569bf08957a56db61970dafca575ad150486fae2f3ecb056a86

    • SSDEEP

      49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034Af:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ7i

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks