General

  • Target

    843e7b1d0d686026aa77aba3c7c013fc_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241101-hwnnsszmbn

  • MD5

    843e7b1d0d686026aa77aba3c7c013fc

  • SHA1

    5741b68b93020e9a49dbd89e4d48ffe214a7b4e0

  • SHA256

    f95161004245b51277ac370267b30498a29aebd2c96795470519419dc4121ccd

  • SHA512

    651e859385679603be6914f64abacc35508d565ef5daf01d5d909484fa8091d00cc6cc17daa534b3025f4aaa45c332397bc8c3aff55c4d5ae9d8e38950608b33

  • SSDEEP

    49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034AB:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ7A

Malware Config

Targets

    • Target

      843e7b1d0d686026aa77aba3c7c013fc_JaffaCakes118

    • Size

      2.6MB

    • MD5

      843e7b1d0d686026aa77aba3c7c013fc

    • SHA1

      5741b68b93020e9a49dbd89e4d48ffe214a7b4e0

    • SHA256

      f95161004245b51277ac370267b30498a29aebd2c96795470519419dc4121ccd

    • SHA512

      651e859385679603be6914f64abacc35508d565ef5daf01d5d909484fa8091d00cc6cc17daa534b3025f4aaa45c332397bc8c3aff55c4d5ae9d8e38950608b33

    • SSDEEP

      49152:R84LjOD2gLUMPv0Cx7nnLjQfKSg6toEchtG4gDF05jFKo7lDg3s/Bd8diZL034AB:m4/OD+Mn0G7nLMiSg6toEcjG4m05jJ7A

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks