General

  • Target

    6311dbe19b9ec870859f47a134941e57_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240521-m6rknabc4t

  • MD5

    6311dbe19b9ec870859f47a134941e57

  • SHA1

    376ddd9b97ecfcd018ffdb11f93fb677ccf88429

  • SHA256

    93a0f9c688ee9c17ca883f0eb186ea450bd0f6b39c13e97723d9ce17a9ae26d1

  • SHA512

    d2555ef6a70edf2c59770abafb37a59c6b7b5061a14ff768d97fe70b1e60f046dd564ab97a375a7821b74784e7f11814fff755b9882dc9f97dde2cffea10f736

  • SSDEEP

    49152:0sUkysx15lYOJLoM4v62mvteFp0QX73ZrH:06tzLoG2Uty1t

Malware Config

Targets

    • Target

      6311dbe19b9ec870859f47a134941e57_JaffaCakes118

    • Size

      1.8MB

    • MD5

      6311dbe19b9ec870859f47a134941e57

    • SHA1

      376ddd9b97ecfcd018ffdb11f93fb677ccf88429

    • SHA256

      93a0f9c688ee9c17ca883f0eb186ea450bd0f6b39c13e97723d9ce17a9ae26d1

    • SHA512

      d2555ef6a70edf2c59770abafb37a59c6b7b5061a14ff768d97fe70b1e60f046dd564ab97a375a7821b74784e7f11814fff755b9882dc9f97dde2cffea10f736

    • SSDEEP

      49152:0sUkysx15lYOJLoM4v62mvteFp0QX73ZrH:06tzLoG2Uty1t

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks