General

  • Target

    662dc37e22bc734704718609fd803370_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240522-gadq2adf81

  • MD5

    662dc37e22bc734704718609fd803370

  • SHA1

    be35c7462b472ac8c60964311aef2fa80bf8d18a

  • SHA256

    a5a62b3cfb4c62d15be22802e4873d62a52472a94b1d972b02f1022f451e7092

  • SHA512

    215418d65c1add4f32c13faf70a42b8662848fc1c2b9b5cfb8410c50f286e0b80af12e146a5924e131d70689b0c9af2c05209fd80e7c0e9ae6db332ede099329

  • SSDEEP

    49152:U9e5oh7nATCs83N6g5mmr1fwGoMBloMHXlu0QfF73ZUY:U9e5oh7nUCsmU/Mv5HXlu1D

Malware Config

Targets

    • Target

      662dc37e22bc734704718609fd803370_JaffaCakes118

    • Size

      1.8MB

    • MD5

      662dc37e22bc734704718609fd803370

    • SHA1

      be35c7462b472ac8c60964311aef2fa80bf8d18a

    • SHA256

      a5a62b3cfb4c62d15be22802e4873d62a52472a94b1d972b02f1022f451e7092

    • SHA512

      215418d65c1add4f32c13faf70a42b8662848fc1c2b9b5cfb8410c50f286e0b80af12e146a5924e131d70689b0c9af2c05209fd80e7c0e9ae6db332ede099329

    • SSDEEP

      49152:U9e5oh7nATCs83N6g5mmr1fwGoMBloMHXlu0QfF73ZUY:U9e5oh7nUCsmU/Mv5HXlu1D

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks