General

  • Target

    673c16c3bffbb516ab32203e923db00c_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240522-pfzjpaaa29

  • MD5

    673c16c3bffbb516ab32203e923db00c

  • SHA1

    b9d584fee3514fffb8f13b2dc68bb75622dd17df

  • SHA256

    92df33b4cd6ab2ca154607cc384060e0090e65e83a936505724c380874957efc

  • SHA512

    9188b7a866b127c58257d8563ceb2bfcc9091fbafab90dc5fdd06e00e001636a375eca1d0d6f832ee2e9bacd18904c6a6ebe182dd311b27b4960ccbc2026aa16

  • SSDEEP

    49152:rp+i39F4xAAzuT0fv/Bl1vEhPH/ptaQkMAJkKChl:rp4xAPy5A9HuJpZg

Malware Config

Targets

    • Target

      673c16c3bffbb516ab32203e923db00c_JaffaCakes118

    • Size

      1.6MB

    • MD5

      673c16c3bffbb516ab32203e923db00c

    • SHA1

      b9d584fee3514fffb8f13b2dc68bb75622dd17df

    • SHA256

      92df33b4cd6ab2ca154607cc384060e0090e65e83a936505724c380874957efc

    • SHA512

      9188b7a866b127c58257d8563ceb2bfcc9091fbafab90dc5fdd06e00e001636a375eca1d0d6f832ee2e9bacd18904c6a6ebe182dd311b27b4960ccbc2026aa16

    • SSDEEP

      49152:rp+i39F4xAAzuT0fv/Bl1vEhPH/ptaQkMAJkKChl:rp4xAPy5A9HuJpZg

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks