General

  • Target

    5f74b0a0604bacafbaa032b5d3953754_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240520-rbpj2ada53

  • MD5

    5f74b0a0604bacafbaa032b5d3953754

  • SHA1

    5bd9b76dfc09b1c2dfdb1f56b6cd4c6f78452b72

  • SHA256

    24e897241a8e4c4c1948a7a3db2f06941befbc351fb6fdd2008da386717efcb5

  • SHA512

    bcc0e8d3986077baf7583fb65b61f4edaeb42aa71b4b8445ec4efeb8d43245780f5c31d4e8a535790e980107d658266797bd5eb0edadbb83da66e827a13aa0d2

  • SSDEEP

    49152:21Y1eDAItwfvJGr1zblnbZL98tOJ6WVw+gBWvPcafkok5gBpUEvtB9uycLcVur:2S1IAfcr1tnRStEw7BWHN1B02tB9rcIi

Malware Config

Targets

    • Target

      5f74b0a0604bacafbaa032b5d3953754_JaffaCakes118

    • Size

      2.6MB

    • MD5

      5f74b0a0604bacafbaa032b5d3953754

    • SHA1

      5bd9b76dfc09b1c2dfdb1f56b6cd4c6f78452b72

    • SHA256

      24e897241a8e4c4c1948a7a3db2f06941befbc351fb6fdd2008da386717efcb5

    • SHA512

      bcc0e8d3986077baf7583fb65b61f4edaeb42aa71b4b8445ec4efeb8d43245780f5c31d4e8a535790e980107d658266797bd5eb0edadbb83da66e827a13aa0d2

    • SSDEEP

      49152:21Y1eDAItwfvJGr1zblnbZL98tOJ6WVw+gBWvPcafkok5gBpUEvtB9uycLcVur:2S1IAfcr1tnRStEw7BWHN1B02tB9rcIi

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks