General

  • Target

    67216a2e4efc19d2f9330deb1d59333d_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240522-nsdmbadb9s

  • MD5

    67216a2e4efc19d2f9330deb1d59333d

  • SHA1

    7420ec8977a54e292881e90c8460e1a526e538a1

  • SHA256

    e1dddaa9afca116ad8e69e22e4cc4bcccc339dfe44a571073c29a7b4f8ff89dd

  • SHA512

    6c36a1172faf9767b8e50256adfa8f5caff2b909789eda7024544f77b4411b05ccb203a66c15cf5f295a84e3c3ab3fdaa1a8d0ae686c67119030c417e097a9e7

  • SSDEEP

    196608:QGegghMH+yXAWJLTe3M1Hz2/9KUtAaxdAHJw:QhhMH+yvjHz2/9ptaHJw

Malware Config

Targets

    • Target

      67216a2e4efc19d2f9330deb1d59333d_JaffaCakes118

    • Size

      6.1MB

    • MD5

      67216a2e4efc19d2f9330deb1d59333d

    • SHA1

      7420ec8977a54e292881e90c8460e1a526e538a1

    • SHA256

      e1dddaa9afca116ad8e69e22e4cc4bcccc339dfe44a571073c29a7b4f8ff89dd

    • SHA512

      6c36a1172faf9767b8e50256adfa8f5caff2b909789eda7024544f77b4411b05ccb203a66c15cf5f295a84e3c3ab3fdaa1a8d0ae686c67119030c417e097a9e7

    • SSDEEP

      196608:QGegghMH+yXAWJLTe3M1Hz2/9KUtAaxdAHJw:QhhMH+yvjHz2/9ptaHJw

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Reads the content of the SMS messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks