General

  • Target

    0d30086119726d07c4d24261f6813df4_JaffaCakes118

  • Size

    8.9MB

  • Sample

    240502-ck5kaaeb2w

  • MD5

    0d30086119726d07c4d24261f6813df4

  • SHA1

    c972f73d6508e14b41bb3e50f57ab5c437784fd4

  • SHA256

    38ac8dce4234d5966823aec9a4bcd2fb7d078f2b666b4b153ee96f7ee65ca92f

  • SHA512

    c2df4ea7738622c6c5635be000f70e161f1f840d77b97f71aec45fc14463ea03e122a7522aef39983981ece4608afcd8506e6f531309edb16686dea28b03d174

  • SSDEEP

    196608:HoDKV0BMExpyVPrc9JpGLo8FobtUdKWO6S434ostfn++4SFJ9egQp:502UyVPcJQl1eH43uR34SFjeH

Malware Config

Targets

    • Target

      0d30086119726d07c4d24261f6813df4_JaffaCakes118

    • Size

      8.9MB

    • MD5

      0d30086119726d07c4d24261f6813df4

    • SHA1

      c972f73d6508e14b41bb3e50f57ab5c437784fd4

    • SHA256

      38ac8dce4234d5966823aec9a4bcd2fb7d078f2b666b4b153ee96f7ee65ca92f

    • SHA512

      c2df4ea7738622c6c5635be000f70e161f1f840d77b97f71aec45fc14463ea03e122a7522aef39983981ece4608afcd8506e6f531309edb16686dea28b03d174

    • SSDEEP

      196608:HoDKV0BMExpyVPrc9JpGLo8FobtUdKWO6S434ostfn++4SFJ9egQp:502UyVPcJQl1eH43uR34SFjeH

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks