General

  • Target

    513eb93fb7c2a5bec09d24e547b1a516_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240517-ysb4lagd6w

  • MD5

    513eb93fb7c2a5bec09d24e547b1a516

  • SHA1

    7862bba019784fd471181eae1acfdf15bdb5a0d7

  • SHA256

    b4d2483bfd54ef65e0ed1745e816b507f9cfba660b5faadbf9803bb7062cff39

  • SHA512

    9c6117887cc58caf76000f40a5fc4ab92382a91b36c523161d08698d3f358901b357c273e4d238dccfe5bec73598a3a4da78b3f8db390f44806f574d3ac55350

  • SSDEEP

    49152:uj/YCiJ4vylbJl3arFRtKVg5gfLeHBGoary9vXKnVsyXqxe41KbpwapeH+kIl8Jf:SaJ4vylbJlqrFRcVg5gKHBGoar+/ChNW

Malware Config

Targets

    • Target

      513eb93fb7c2a5bec09d24e547b1a516_JaffaCakes118

    • Size

      2.0MB

    • MD5

      513eb93fb7c2a5bec09d24e547b1a516

    • SHA1

      7862bba019784fd471181eae1acfdf15bdb5a0d7

    • SHA256

      b4d2483bfd54ef65e0ed1745e816b507f9cfba660b5faadbf9803bb7062cff39

    • SHA512

      9c6117887cc58caf76000f40a5fc4ab92382a91b36c523161d08698d3f358901b357c273e4d238dccfe5bec73598a3a4da78b3f8db390f44806f574d3ac55350

    • SSDEEP

      49152:uj/YCiJ4vylbJl3arFRtKVg5gfLeHBGoary9vXKnVsyXqxe41KbpwapeH+kIl8Jf:SaJ4vylbJlqrFRcVg5gKHBGoar+/ChNW

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks