General

  • Target

    533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240518-ggnvksec9s

  • MD5

    533caf598d587d6a115c8ca5e0d3ed75

  • SHA1

    6634377b70983c613f8863de78db52d053a966f3

  • SHA256

    86b298735bfcecd9a3c96dde327ea77f998873a98784e98befbebb4e2a90fb4c

  • SHA512

    6655526bf4b585c6f4e1ee223683566c8d6bf73003ffa6e7e6ff9c2c1728e21d6e5641dbcbe12821b11b8a3e1492bb0c2414b86b33dace0f32434ab7e3e5c30e

  • SSDEEP

    49152:ItSgvL4Z0Ru1ZR3C7VBuQnXxNGES0QwhS73ZL6:I9T4GRgjAVBuQB431kb

Malware Config

Targets

    • Target

      533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118

    • Size

      1.9MB

    • MD5

      533caf598d587d6a115c8ca5e0d3ed75

    • SHA1

      6634377b70983c613f8863de78db52d053a966f3

    • SHA256

      86b298735bfcecd9a3c96dde327ea77f998873a98784e98befbebb4e2a90fb4c

    • SHA512

      6655526bf4b585c6f4e1ee223683566c8d6bf73003ffa6e7e6ff9c2c1728e21d6e5641dbcbe12821b11b8a3e1492bb0c2414b86b33dace0f32434ab7e3e5c30e

    • SSDEEP

      49152:ItSgvL4Z0Ru1ZR3C7VBuQnXxNGES0QwhS73ZL6:I9T4GRgjAVBuQB431kb

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks