General

  • Target

    0187222e21468c35481dacfa592ba636_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240426-yjf17aah27

  • MD5

    0187222e21468c35481dacfa592ba636

  • SHA1

    12dbb5551fbf0579f78e6de75b4b752c55985acb

  • SHA256

    77d5d2ca064647b5b88c12e46c029d67f5759a99b62794a10d0fe7d2eb66a905

  • SHA512

    ab091296592eb3b1a7571ac9202108366e0944d77eae912c69fd9f19f8b19c1476dca67a4ff9149d0f93412cc9809c4510fdd0b57497179e815ac3de0ae82206

  • SSDEEP

    49152:kUZh+LT6SbVK4A2HeGZ5Oxgs9KqmOzbOdjXfs1:kih+LW8hfHeGbOx3DpOdjXfU

Malware Config

Targets

    • Target

      0187222e21468c35481dacfa592ba636_JaffaCakes118

    • Size

      2.0MB

    • MD5

      0187222e21468c35481dacfa592ba636

    • SHA1

      12dbb5551fbf0579f78e6de75b4b752c55985acb

    • SHA256

      77d5d2ca064647b5b88c12e46c029d67f5759a99b62794a10d0fe7d2eb66a905

    • SHA512

      ab091296592eb3b1a7571ac9202108366e0944d77eae912c69fd9f19f8b19c1476dca67a4ff9149d0f93412cc9809c4510fdd0b57497179e815ac3de0ae82206

    • SSDEEP

      49152:kUZh+LT6SbVK4A2HeGZ5Oxgs9KqmOzbOdjXfs1:kih+LW8hfHeGbOx3DpOdjXfU

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Reads the contacts stored on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks