General

  • Target

    52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240518-cvscpsfh5z

  • MD5

    52a3733bfc9b889f54e17c87db79ac39

  • SHA1

    20fbaf5f276ef03f36edbe9448aad5b0df23b2f2

  • SHA256

    850bdbcd6d5f74d3b5958ae440e5b65134eadc949f1f9acc6ed790d3a9cd483a

  • SHA512

    6b9333dc1a3f13a90d35df6a2ec7ca8c0d6551f8671d444b2655349c3989b68e9f7ac9f45048b0e4bbe52aed4c331d31a4fe82e369c06b0f0fce98a742a8b548

  • SSDEEP

    49152:XxMMQjcEIzqWrrfi3rQrnXtKXFTkOKLiwM0Qiuk/wuk/Xuk/I73ZEv:Xu5Yzqoi7qkOOKGwM1iuDuCum

Malware Config

Targets

    • Target

      52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118

    • Size

      1.9MB

    • MD5

      52a3733bfc9b889f54e17c87db79ac39

    • SHA1

      20fbaf5f276ef03f36edbe9448aad5b0df23b2f2

    • SHA256

      850bdbcd6d5f74d3b5958ae440e5b65134eadc949f1f9acc6ed790d3a9cd483a

    • SHA512

      6b9333dc1a3f13a90d35df6a2ec7ca8c0d6551f8671d444b2655349c3989b68e9f7ac9f45048b0e4bbe52aed4c331d31a4fe82e369c06b0f0fce98a742a8b548

    • SSDEEP

      49152:XxMMQjcEIzqWrrfi3rQrnXtKXFTkOKLiwM0Qiuk/wuk/Xuk/I73ZEv:Xu5Yzqoi7qkOOKGwM1iuDuCum

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks