General

  • Target

    0004ad78efa4e335eba9d68398b50507_JaffaCakes118

  • Size

    14.8MB

  • Sample

    240425-zbtsraed58

  • MD5

    0004ad78efa4e335eba9d68398b50507

  • SHA1

    358024a3fbe8aab34c3e9cde188e8dc61aef3aae

  • SHA256

    dae56eafb932cd7a99768c697c305646eacf7fbdb9f421b1f318b66d446ca689

  • SHA512

    ceb5700d98346e7ba1a91160fd7b44a0738abfea1122a867b5a9a007fd64e2af7ce9cf81c4fe41f8f9901f5bdcf5e202d27a6f069130e8c607203480e15aa580

  • SSDEEP

    393216:uQtBWd+QtBWdjQtBWdlQtBWdJQtBWdMQtBWdD:J+H+G+w+Q+5+R

Malware Config

Targets

    • Target

      0004ad78efa4e335eba9d68398b50507_JaffaCakes118

    • Size

      14.8MB

    • MD5

      0004ad78efa4e335eba9d68398b50507

    • SHA1

      358024a3fbe8aab34c3e9cde188e8dc61aef3aae

    • SHA256

      dae56eafb932cd7a99768c697c305646eacf7fbdb9f421b1f318b66d446ca689

    • SHA512

      ceb5700d98346e7ba1a91160fd7b44a0738abfea1122a867b5a9a007fd64e2af7ce9cf81c4fe41f8f9901f5bdcf5e202d27a6f069130e8c607203480e15aa580

    • SSDEEP

      393216:uQtBWd+QtBWdjQtBWdlQtBWdJQtBWdMQtBWdD:J+H+G+w+Q+5+R

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks