General

  • Target

    87bfdebb6d8479279faf6a4c57bb37a7_JaffaCakes118

  • Size

    2.8MB

  • Sample

    241102-zyhzrsvnav

  • MD5

    87bfdebb6d8479279faf6a4c57bb37a7

  • SHA1

    b2e1796d75d5aafd8ea6d23a984372d679ec22f5

  • SHA256

    463220b70efb8f59e01eba2075a338e145b3463d6b61632cce503a9eadb2613b

  • SHA512

    2a3143f7d63aa2ede740cffbc56c0ed982d64aa0e437cadbb18a3e8db4139227e2681a6c8dc74c941de20bd645032507444c0fb792241dfe643dcd340b9040c0

  • SSDEEP

    49152:Oj4VjfD4ObAbSOZPcPr6mdu/d6YzyHatsl/eHLDRbLtX8mpcgXU34yhzzpgNmJRj:W4RfDpOnkemdu/n4eHJbBaDhGi

Malware Config

Targets

    • Target

      87bfdebb6d8479279faf6a4c57bb37a7_JaffaCakes118

    • Size

      2.8MB

    • MD5

      87bfdebb6d8479279faf6a4c57bb37a7

    • SHA1

      b2e1796d75d5aafd8ea6d23a984372d679ec22f5

    • SHA256

      463220b70efb8f59e01eba2075a338e145b3463d6b61632cce503a9eadb2613b

    • SHA512

      2a3143f7d63aa2ede740cffbc56c0ed982d64aa0e437cadbb18a3e8db4139227e2681a6c8dc74c941de20bd645032507444c0fb792241dfe643dcd340b9040c0

    • SSDEEP

      49152:Oj4VjfD4ObAbSOZPcPr6mdu/d6YzyHatsl/eHLDRbLtX8mpcgXU34yhzzpgNmJRj:W4RfDpOnkemdu/n4eHJbBaDhGi

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks