General

  • Target

    538a67ffd53042cd6e35d077ab91dc93_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241017-y37m9axdkq

  • MD5

    538a67ffd53042cd6e35d077ab91dc93

  • SHA1

    9e84609cbee887bc5a8dffda7dedaa66c55ac618

  • SHA256

    596614a6c60600855bc717824738b15795c15da2c05011e39d08476a13dbe53d

  • SHA512

    ff3de9cfb19915c12d22cc78dd53d1b0879f6b27d572f3b9ccdf76bf7b04a077c31bc306ea77a937fb691b4d6cdad0473495dd891bf02a1ee812447a90897ba3

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6Dz:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GX

Malware Config

Targets

    • Target

      538a67ffd53042cd6e35d077ab91dc93_JaffaCakes118

    • Size

      4.6MB

    • MD5

      538a67ffd53042cd6e35d077ab91dc93

    • SHA1

      9e84609cbee887bc5a8dffda7dedaa66c55ac618

    • SHA256

      596614a6c60600855bc717824738b15795c15da2c05011e39d08476a13dbe53d

    • SHA512

      ff3de9cfb19915c12d22cc78dd53d1b0879f6b27d572f3b9ccdf76bf7b04a077c31bc306ea77a937fb691b4d6cdad0473495dd891bf02a1ee812447a90897ba3

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6Dz:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GX

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks