General

  • Target

    30db97839a17e5a37d083a315fef0a28_JaffaCakes118

  • Size

    939KB

  • Sample

    240510-y1vwnsae62

  • MD5

    30db97839a17e5a37d083a315fef0a28

  • SHA1

    f5b2c2cfda0ed2e44bd358e77baa7be64168eb82

  • SHA256

    2214ab07c8641836d687bcb48bf6463b192d2b6719bf140f7599f82cc0b7f066

  • SHA512

    91b34913f57d05e6904788c448a8a2e48a98bce6ea645620a35b3f0c88ad9e40a6a70a0186641d70e10b10fd7e3897219de6723e19bedc715e4b3df08d0834a5

  • SSDEEP

    12288:R8G/4vFJXZQXkKy6hmJGL66vMjajil3ZJOL6CsYIjP3cryKuV5G0ipUzMV:uFJXnQS0vFjW3OL6RjPcrlI5GPpUYV

Malware Config

Targets

    • Target

      30db97839a17e5a37d083a315fef0a28_JaffaCakes118

    • Size

      939KB

    • MD5

      30db97839a17e5a37d083a315fef0a28

    • SHA1

      f5b2c2cfda0ed2e44bd358e77baa7be64168eb82

    • SHA256

      2214ab07c8641836d687bcb48bf6463b192d2b6719bf140f7599f82cc0b7f066

    • SHA512

      91b34913f57d05e6904788c448a8a2e48a98bce6ea645620a35b3f0c88ad9e40a6a70a0186641d70e10b10fd7e3897219de6723e19bedc715e4b3df08d0834a5

    • SSDEEP

      12288:R8G/4vFJXZQXkKy6hmJGL66vMjajil3ZJOL6CsYIjP3cryKuV5G0ipUzMV:uFJXnQS0vFjW3OL6RjPcrlI5GPpUYV

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks