General

  • Target

    01c3ee13eaba01a5a021304641fa3c04_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240426-1ygmdada82

  • MD5

    01c3ee13eaba01a5a021304641fa3c04

  • SHA1

    3b770e80394d07981fd376982b1c8b68036c8d0e

  • SHA256

    aff0c2d550f78cab13f41f5c7dcb60ef104425efa46114b2026e9442ffbddd93

  • SHA512

    c61a53c285f373172900fffb09485ff98fea7aeb390c0fcf24e3e87463555153055dc1467054e2ca550338f3ad7627187b01e075f220ff332c9426e5fd2451eb

  • SSDEEP

    49152:UU1Wj6oBjiv6wjLXoH3Hw8Nq0QOq73Zu6:UU1kiv6qWHY1t

Malware Config

Targets

    • Target

      01c3ee13eaba01a5a021304641fa3c04_JaffaCakes118

    • Size

      1.9MB

    • MD5

      01c3ee13eaba01a5a021304641fa3c04

    • SHA1

      3b770e80394d07981fd376982b1c8b68036c8d0e

    • SHA256

      aff0c2d550f78cab13f41f5c7dcb60ef104425efa46114b2026e9442ffbddd93

    • SHA512

      c61a53c285f373172900fffb09485ff98fea7aeb390c0fcf24e3e87463555153055dc1467054e2ca550338f3ad7627187b01e075f220ff332c9426e5fd2451eb

    • SSDEEP

      49152:UU1Wj6oBjiv6wjLXoH3Hw8Nq0QOq73Zu6:UU1kiv6qWHY1t

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks