General

  • Target

    3f62a00ca38e4c5b8767b95d8f7f2e23_JaffaCakes118

  • Size

    772KB

  • Sample

    240513-n5tt3aed87

  • MD5

    3f62a00ca38e4c5b8767b95d8f7f2e23

  • SHA1

    0743e79f4a410a8db96a7eedcc7eb31c2358c86e

  • SHA256

    4df44db4b4ae04d36e778f6d29c09e77a32032be5ad273e2652389b5482b1e28

  • SHA512

    dbb81e7ad81dd3c80724a4b72458ac7fd51e79e87db165b143da1f1df1dbc4b2e96c7132abb4d53e209995443867c122ba71087795a2ec3b2e5b5ea8ec32e24c

  • SSDEEP

    24576:kcYBMWH4HMHSR811nzxg+wjWtMxghn529:3WYsyR81UnJUnm

Malware Config

Targets

    • Target

      3f62a00ca38e4c5b8767b95d8f7f2e23_JaffaCakes118

    • Size

      772KB

    • MD5

      3f62a00ca38e4c5b8767b95d8f7f2e23

    • SHA1

      0743e79f4a410a8db96a7eedcc7eb31c2358c86e

    • SHA256

      4df44db4b4ae04d36e778f6d29c09e77a32032be5ad273e2652389b5482b1e28

    • SHA512

      dbb81e7ad81dd3c80724a4b72458ac7fd51e79e87db165b143da1f1df1dbc4b2e96c7132abb4d53e209995443867c122ba71087795a2ec3b2e5b5ea8ec32e24c

    • SSDEEP

      24576:kcYBMWH4HMHSR811nzxg+wjWtMxghn529:3WYsyR81UnJUnm

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks