General

  • Target

    4827ec44230ebff42696c483c436ef27_JaffaCakes118

  • Size

    30.8MB

  • Sample

    240515-1hfp5sdc6s

  • MD5

    4827ec44230ebff42696c483c436ef27

  • SHA1

    918b792b2aab56fb22283edecba2f8deae422777

  • SHA256

    f91b1dba1c0eabe51715da817bea77ec14c8c9bd68daa5f7fe2d35c8bea2156b

  • SHA512

    d8d04e236bffc22b4a404437dde489d282fea8b58629f202911e04301bddc70a9d53c1f894405d5e90a7a72c06acbbcf7721226e202d1fe4468a3826057c4c3d

  • SSDEEP

    786432:nvSStD3HlD+a6mh4Z6tAptS5JhPjkaowf1DPyFlanySut6nA7:JD39H86tAptQJhQGIoyt57

Malware Config

Targets

    • Target

      4827ec44230ebff42696c483c436ef27_JaffaCakes118

    • Size

      30.8MB

    • MD5

      4827ec44230ebff42696c483c436ef27

    • SHA1

      918b792b2aab56fb22283edecba2f8deae422777

    • SHA256

      f91b1dba1c0eabe51715da817bea77ec14c8c9bd68daa5f7fe2d35c8bea2156b

    • SHA512

      d8d04e236bffc22b4a404437dde489d282fea8b58629f202911e04301bddc70a9d53c1f894405d5e90a7a72c06acbbcf7721226e202d1fe4468a3826057c4c3d

    • SSDEEP

      786432:nvSStD3HlD+a6mh4Z6tAptS5JhPjkaowf1DPyFlanySut6nA7:JD39H86tAptQJhQGIoyt57

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks