General

  • Target

    56a7502122fbb0f2d4ebdc174fb0545a_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241018-ldhlls1hmm

  • MD5

    56a7502122fbb0f2d4ebdc174fb0545a

  • SHA1

    0df10914134d432864836b43ca51b98656461a4d

  • SHA256

    936c501044abf0bb51d9a8c341eefd358042382ec2d67dfe0f9788c9255d6842

  • SHA512

    2798745a6fa0af071af42cc7bf7e4ac9ab133fa638a173449f4eb503fa846ff8b9e3f8dc6945bb47d10b6428563a2461fa7bec7ed4f968166c31a476bc0bfc4f

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6De:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GK

Malware Config

Targets

    • Target

      56a7502122fbb0f2d4ebdc174fb0545a_JaffaCakes118

    • Size

      4.6MB

    • MD5

      56a7502122fbb0f2d4ebdc174fb0545a

    • SHA1

      0df10914134d432864836b43ca51b98656461a4d

    • SHA256

      936c501044abf0bb51d9a8c341eefd358042382ec2d67dfe0f9788c9255d6842

    • SHA512

      2798745a6fa0af071af42cc7bf7e4ac9ab133fa638a173449f4eb503fa846ff8b9e3f8dc6945bb47d10b6428563a2461fa7bec7ed4f968166c31a476bc0bfc4f

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6De:pn/I5It9fFhhlkcBKTHjZUKV86w7w4GK

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks