General

  • Target

    683dcbbb1f3046283fe7c1f2de24316e_JaffaCakes118

  • Size

    935KB

  • Sample

    240522-xcswqscd5w

  • MD5

    683dcbbb1f3046283fe7c1f2de24316e

  • SHA1

    106fd5cfae0ddd0c1f6f133bdaf7f066db6f21c8

  • SHA256

    9a23c38a381ad5da1bafa631592600808fa45afac96c96342cdcda924a4e645a

  • SHA512

    c283bb7b5ba91f29a7aef8f3db0dd5272b434e190af313814422d8181fdb5d4ac375e5f418a16798dc9e9fa67fcf06ec5a32ac579ad4e74ce3efb992e9d53711

  • SSDEEP

    24576:vSduhMZoo2WOtTqS5/3hx/9YBOPUvA6LZze6LFXEL:vSe0pe5ZxlCDA6LBeEFUL

Malware Config

Targets

    • Target

      683dcbbb1f3046283fe7c1f2de24316e_JaffaCakes118

    • Size

      935KB

    • MD5

      683dcbbb1f3046283fe7c1f2de24316e

    • SHA1

      106fd5cfae0ddd0c1f6f133bdaf7f066db6f21c8

    • SHA256

      9a23c38a381ad5da1bafa631592600808fa45afac96c96342cdcda924a4e645a

    • SHA512

      c283bb7b5ba91f29a7aef8f3db0dd5272b434e190af313814422d8181fdb5d4ac375e5f418a16798dc9e9fa67fcf06ec5a32ac579ad4e74ce3efb992e9d53711

    • SSDEEP

      24576:vSduhMZoo2WOtTqS5/3hx/9YBOPUvA6LZze6LFXEL:vSe0pe5ZxlCDA6LBeEFUL

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks