General

  • Target

    63e70af263148237c30122fdc3aab88e_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240521-tkrrvsbc74

  • MD5

    63e70af263148237c30122fdc3aab88e

  • SHA1

    65721ef9bf1e23d224343de1d79dedcd46c89b41

  • SHA256

    d3df49f7c953b05c5460114efa5d6e5ec2dcbde3cd022848919f68bab4adfccb

  • SHA512

    fffe9bf90cd9f1e9384c2555e17528d22488e9f1df2d68ad5b51ce23b6646f9f649a309106125f39fddf0ef3860e148403ea7d1c0d7e92a4c80011e87b02ecc4

  • SSDEEP

    49152:Jc+2i9gGEsNXIMjnFW5CApgiaIUwph4norItrgn:JcjiZ1TQk/iJUwphMorki

Malware Config

Targets

    • Target

      63e70af263148237c30122fdc3aab88e_JaffaCakes118

    • Size

      1.9MB

    • MD5

      63e70af263148237c30122fdc3aab88e

    • SHA1

      65721ef9bf1e23d224343de1d79dedcd46c89b41

    • SHA256

      d3df49f7c953b05c5460114efa5d6e5ec2dcbde3cd022848919f68bab4adfccb

    • SHA512

      fffe9bf90cd9f1e9384c2555e17528d22488e9f1df2d68ad5b51ce23b6646f9f649a309106125f39fddf0ef3860e148403ea7d1c0d7e92a4c80011e87b02ecc4

    • SSDEEP

      49152:Jc+2i9gGEsNXIMjnFW5CApgiaIUwph4norItrgn:JcjiZ1TQk/iJUwphMorki

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks