General

  • Target

    571e7ea79c983c91b4800770e3891f44_JaffaCakes118

  • Size

    2.9MB

  • Sample

    241018-na4qsawfll

  • MD5

    571e7ea79c983c91b4800770e3891f44

  • SHA1

    849464505e4bc96869110d812c2dd80e68183d37

  • SHA256

    db778ac39ab7119df7bb00f5febe1a48e30c32e4de18410d609d1d9455614b60

  • SHA512

    1ffbe9ce0f35eee26b894a8036fc622cf705a740d188cd2cf354e7a651367e9344b0448ecdcb76045368c70e67e7d42d34369aacacfebe25e116d3433ef60e1b

  • SSDEEP

    49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHG:X4ByD8PDc8qjIUVmOYy+A9whgHG

Malware Config

Targets

    • Target

      571e7ea79c983c91b4800770e3891f44_JaffaCakes118

    • Size

      2.9MB

    • MD5

      571e7ea79c983c91b4800770e3891f44

    • SHA1

      849464505e4bc96869110d812c2dd80e68183d37

    • SHA256

      db778ac39ab7119df7bb00f5febe1a48e30c32e4de18410d609d1d9455614b60

    • SHA512

      1ffbe9ce0f35eee26b894a8036fc622cf705a740d188cd2cf354e7a651367e9344b0448ecdcb76045368c70e67e7d42d34369aacacfebe25e116d3433ef60e1b

    • SSDEEP

      49152:Dz4FjyDu3JZ15pLyn4o8xa8qjFlEDeSU60XAHIDzYEPJ1GnA9+xlhwTHHG:X4ByD8PDc8qjIUVmOYy+A9whgHG

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks