General

  • Target

    65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118

  • Size

    627KB

  • Sample

    240522-cvc8sahc77

  • MD5

    65ad0375ec7c1b75a36242b2872a3d34

  • SHA1

    4aa6f48bc710488f8b9dc0e080e2d6b13b2cf485

  • SHA256

    44afce93020bdd8f3ba3e0c62a654447371b9e84de8e019832e09df901930b86

  • SHA512

    2d248a90ddadebaaea49cea924735ba12e7a3a8a8553d45d6b604e4c1f8564fadfc64c43858177548a67570b1ad0e658f407d08e000507b9eca0f7ccb9873b46

  • SSDEEP

    12288:/6LB0DwAV8T5rjQy1o2Ngp5v4VMQxDAFjonGVsaH80fUTYY6/:imwn5Do2N45AvDAFjQGPfUTg/

Malware Config

Targets

    • Target

      65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118

    • Size

      627KB

    • MD5

      65ad0375ec7c1b75a36242b2872a3d34

    • SHA1

      4aa6f48bc710488f8b9dc0e080e2d6b13b2cf485

    • SHA256

      44afce93020bdd8f3ba3e0c62a654447371b9e84de8e019832e09df901930b86

    • SHA512

      2d248a90ddadebaaea49cea924735ba12e7a3a8a8553d45d6b604e4c1f8564fadfc64c43858177548a67570b1ad0e658f407d08e000507b9eca0f7ccb9873b46

    • SSDEEP

      12288:/6LB0DwAV8T5rjQy1o2Ngp5v4VMQxDAFjonGVsaH80fUTYY6/:imwn5Do2N45AvDAFjQGPfUTg/

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks