General

  • Target

    56c3ca28229c13c5199553964ad85537_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241018-ltsfrazfkg

  • MD5

    56c3ca28229c13c5199553964ad85537

  • SHA1

    d15faa735a7968e4e44410f8c230f6c42c671c42

  • SHA256

    3ae42fe88164916e0c5fa69e03987acbe7d0ce5488bd8b420c27194a2f9ed071

  • SHA512

    5d6a4e8033729a1aee287384d32f0c4ca91df9fdc036d4a4a134bf76e885af2932555253d865a832a6fc06c92c8b51652c19e180d04e66472211f842ce228107

  • SSDEEP

    98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DZ:pn/I5It9fFhhlkcBKTHjZUKV86w7w4G9

Malware Config

Targets

    • Target

      56c3ca28229c13c5199553964ad85537_JaffaCakes118

    • Size

      4.6MB

    • MD5

      56c3ca28229c13c5199553964ad85537

    • SHA1

      d15faa735a7968e4e44410f8c230f6c42c671c42

    • SHA256

      3ae42fe88164916e0c5fa69e03987acbe7d0ce5488bd8b420c27194a2f9ed071

    • SHA512

      5d6a4e8033729a1aee287384d32f0c4ca91df9fdc036d4a4a134bf76e885af2932555253d865a832a6fc06c92c8b51652c19e180d04e66472211f842ce228107

    • SSDEEP

      98304:pYeLd/1i589M+t9fcKhpPXsKkpCBKwMn1HXXguZUKh/Iz6weYDCn4r6DZ:pn/I5It9fFhhlkcBKTHjZUKV86w7w4G9

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks