General

  • Target

    679f92481a5fd52740f69c7639a4311f_JaffaCakes118

  • Size

    600KB

  • Sample

    240522-r5fh8aeh3w

  • MD5

    679f92481a5fd52740f69c7639a4311f

  • SHA1

    5e07cb8a16ea233ee617897ef710f799f3a4fcd5

  • SHA256

    9e14bedc5f5a619ffd5ed95eb98312384ac0da2667bacbf3daeea5f359b67212

  • SHA512

    8b01161d2761f7a39af2254e72d37a8ac48ae88398dfaec6d9013d556a4fba84968f86170ee9001661b15c220ec9534905f5eff91acf9db703976062f2a3b394

  • SSDEEP

    12288:uEQxhv+5dElRinRQomdi3p/QTaRHa0fiadICelXXzua9i:uVRC2inRQfuQTIHa0fiAbelzuaU

Malware Config

Targets

    • Target

      679f92481a5fd52740f69c7639a4311f_JaffaCakes118

    • Size

      600KB

    • MD5

      679f92481a5fd52740f69c7639a4311f

    • SHA1

      5e07cb8a16ea233ee617897ef710f799f3a4fcd5

    • SHA256

      9e14bedc5f5a619ffd5ed95eb98312384ac0da2667bacbf3daeea5f359b67212

    • SHA512

      8b01161d2761f7a39af2254e72d37a8ac48ae88398dfaec6d9013d556a4fba84968f86170ee9001661b15c220ec9534905f5eff91acf9db703976062f2a3b394

    • SSDEEP

      12288:uEQxhv+5dElRinRQomdi3p/QTaRHa0fiadICelXXzua9i:uVRC2inRQfuQTIHa0fiAbelzuaU

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks