General

  • Target

    53b8bbdc1423babcad3287e4382a9afb_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241017-zwdx2awela

  • MD5

    53b8bbdc1423babcad3287e4382a9afb

  • SHA1

    4ce84d42b03a99f086d82570eefecca790f04760

  • SHA256

    167e571fbb066507142b79d09315cd34c88c99ee3639d8b3f4a0e018f21cdb0a

  • SHA512

    4ef705776c7c5b7192bbe78f6dc6af0db39d02c0bd7030e54b8b3d9d7bc78e7ea47dd1eec571ef467b86d6899829a9c3873a41ac740961a28a63fd87ce8898b5

  • SSDEEP

    49152:tCSbgeRPE48XUtehd7Dk2rkho9YcFEtvhwL1FJUpmxweH+J6KsMxooVG8yP:tpN3Y0iX9YOEtvSwQ+J6KsMZVzyP

Malware Config

Targets

    • Target

      53b8bbdc1423babcad3287e4382a9afb_JaffaCakes118

    • Size

      2.6MB

    • MD5

      53b8bbdc1423babcad3287e4382a9afb

    • SHA1

      4ce84d42b03a99f086d82570eefecca790f04760

    • SHA256

      167e571fbb066507142b79d09315cd34c88c99ee3639d8b3f4a0e018f21cdb0a

    • SHA512

      4ef705776c7c5b7192bbe78f6dc6af0db39d02c0bd7030e54b8b3d9d7bc78e7ea47dd1eec571ef467b86d6899829a9c3873a41ac740961a28a63fd87ce8898b5

    • SSDEEP

      49152:tCSbgeRPE48XUtehd7Dk2rkho9YcFEtvhwL1FJUpmxweH+J6KsMxooVG8yP:tpN3Y0iX9YOEtvSwQ+J6KsMZVzyP

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Target

      superuser.png

    • Size

      191KB

    • MD5

      4ec9e96986478cb000f9d58f374f39f5

    • SHA1

      7479e11f4df198c743bd430ef54f94999690c73b

    • SHA256

      df3c4cbe2b41398bf8e1e807f5ca1b8a6ca2ebe3f1686f95bc36ea83bbea694e

    • SHA512

      66014107235633919b12ec22437d95651b9f00ea6a0eee5e90ee957b6a4e12b05cecd6a217d4b92e206d8e38442a9e10a754c4275a50fcf19c984b41edaf32f9

    • SSDEEP

      3072:ysF8CMXMGIIFzrdQ5023X9phSTt6rUKaJ/O4OroXB2Nda6B5Hpb2/:dFsXoIxrdQ502JUpNTOsxgBpc/

    Score
    7/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks