General

  • Target

    62be1a48220023e087048f914c52a431_JaffaCakes118

  • Size

    9.8MB

  • Sample

    240521-k3hggafg6t

  • MD5

    62be1a48220023e087048f914c52a431

  • SHA1

    54b03a053b659a248782598a4248339be88eb45c

  • SHA256

    10e046aebf5edc55dc6b1268f82ff0d302634dc259fa61fdcb81f88cd270cf8c

  • SHA512

    eb095c8e5d2c32616193fafd58469d7d1ea8f5e4b97b409c6cebfaa7a8dcaf2788a38351366521143ef047e74997f984590babdac720497b18396dc8667c76dc

  • SSDEEP

    196608:5fdBEil2/uwZNQ2m1cmmSQznvcktKBkH0GvsjGnTM72wiN:9dz22wrmRmSOn1IQznTW2jN

Malware Config

Targets

    • Target

      62be1a48220023e087048f914c52a431_JaffaCakes118

    • Size

      9.8MB

    • MD5

      62be1a48220023e087048f914c52a431

    • SHA1

      54b03a053b659a248782598a4248339be88eb45c

    • SHA256

      10e046aebf5edc55dc6b1268f82ff0d302634dc259fa61fdcb81f88cd270cf8c

    • SHA512

      eb095c8e5d2c32616193fafd58469d7d1ea8f5e4b97b409c6cebfaa7a8dcaf2788a38351366521143ef047e74997f984590babdac720497b18396dc8667c76dc

    • SSDEEP

      196608:5fdBEil2/uwZNQ2m1cmmSQznvcktKBkH0GvsjGnTM72wiN:9dz22wrmRmSOn1IQznTW2jN

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks