General

  • Target

    65d021050bba08457209744235737fe2_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240522-dqefqaae7s

  • MD5

    65d021050bba08457209744235737fe2

  • SHA1

    901e71564a29a26535bc4d3d64878a1aff859acb

  • SHA256

    68d02913ac4620747825bf163dee15bd13eecb0cd4d2ecf433f54fa2028de4f3

  • SHA512

    824eaecff70c7aec1ec76f50063553c1c67e154ea4706b1f2f48c2aed1fead267903feb5924e4a98d3606406d9ddab9d970de421a520ec9f597b260c27e020e9

  • SSDEEP

    98304:B/TEwjGru+008VhEPUF433Sf/pk9Q4BfuwBfDgey/9hue02NKt7IJ5PtWiPtfW:B/wiGaZDoUa3c/pkW4puwhgpY2NKiJte

Malware Config

Targets

    • Target

      65d021050bba08457209744235737fe2_JaffaCakes118

    • Size

      5.9MB

    • MD5

      65d021050bba08457209744235737fe2

    • SHA1

      901e71564a29a26535bc4d3d64878a1aff859acb

    • SHA256

      68d02913ac4620747825bf163dee15bd13eecb0cd4d2ecf433f54fa2028de4f3

    • SHA512

      824eaecff70c7aec1ec76f50063553c1c67e154ea4706b1f2f48c2aed1fead267903feb5924e4a98d3606406d9ddab9d970de421a520ec9f597b260c27e020e9

    • SSDEEP

      98304:B/TEwjGru+008VhEPUF433Sf/pk9Q4BfuwBfDgey/9hue02NKt7IJ5PtWiPtfW:B/wiGaZDoUa3c/pkW4puwhgpY2NKiJte

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks