General

  • Target

    65802c85ecd70712ed4d040b19a80d0e_JaffaCakes118

  • Size

    29.2MB

  • Sample

    240522-bqhf9sfg77

  • MD5

    65802c85ecd70712ed4d040b19a80d0e

  • SHA1

    b62e44aa6a5fbcb6be7b00af1ae4950dfbabeedd

  • SHA256

    38946992ae547ceeccbe9282e18769f7d921d55c7b62f41a42f448c7e53983a9

  • SHA512

    b2b61acc61e434846b918158437d152b2e70508bac832bb30b292702f460b440f544ba198a3151db03da9780399309867c0af8e9de9d159a5606b618a6f440b3

  • SSDEEP

    786432:jPURpfrujqhfemmv6gEiSLe44Z3DzTV1RY:DXq5nqQ4RTVo

Malware Config

Targets

    • Target

      65802c85ecd70712ed4d040b19a80d0e_JaffaCakes118

    • Size

      29.2MB

    • MD5

      65802c85ecd70712ed4d040b19a80d0e

    • SHA1

      b62e44aa6a5fbcb6be7b00af1ae4950dfbabeedd

    • SHA256

      38946992ae547ceeccbe9282e18769f7d921d55c7b62f41a42f448c7e53983a9

    • SHA512

      b2b61acc61e434846b918158437d152b2e70508bac832bb30b292702f460b440f544ba198a3151db03da9780399309867c0af8e9de9d159a5606b618a6f440b3

    • SSDEEP

      786432:jPURpfrujqhfemmv6gEiSLe44Z3DzTV1RY:DXq5nqQ4RTVo

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks