General

  • Target

    314063c73bad5258c94135b7222a3be3_JaffaCakes118

  • Size

    913KB

  • Sample

    240510-1x1zmacb6x

  • MD5

    314063c73bad5258c94135b7222a3be3

  • SHA1

    0dbb1103a255024cdf193de3a0c90a3a5f3ff277

  • SHA256

    cbd94984d063f438885334b700899d82bbbcd76f534e820123d400befaf32816

  • SHA512

    5dcbaacc88572815fa9f2a4fbca6b2721d9e7a4d11883c9cb2cf3ee5e85941fcc68e34cdc90f6cfa6ee4516435c7755bf29108efb7f6ccbcf095b483dcdd7cea

  • SSDEEP

    12288:orw0ufjfzQ4gWa9/dF1Xk262dpIK/N1KrsT:qw0uBgWIFVk262dpIENIsT

Malware Config

Targets

    • Target

      314063c73bad5258c94135b7222a3be3_JaffaCakes118

    • Size

      913KB

    • MD5

      314063c73bad5258c94135b7222a3be3

    • SHA1

      0dbb1103a255024cdf193de3a0c90a3a5f3ff277

    • SHA256

      cbd94984d063f438885334b700899d82bbbcd76f534e820123d400befaf32816

    • SHA512

      5dcbaacc88572815fa9f2a4fbca6b2721d9e7a4d11883c9cb2cf3ee5e85941fcc68e34cdc90f6cfa6ee4516435c7755bf29108efb7f6ccbcf095b483dcdd7cea

    • SSDEEP

      12288:orw0ufjfzQ4gWa9/dF1Xk262dpIK/N1KrsT:qw0uBgWIFVk262dpIENIsT

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks