General

  • Target

    6c7823ac11aecd6f900790c06e47c7f3_JaffaCakes118

  • Size

    94KB

  • Sample

    240523-2fewhabd9x

  • MD5

    6c7823ac11aecd6f900790c06e47c7f3

  • SHA1

    eccfcec7462905d9e6f408710b69eb416497dd7d

  • SHA256

    a2466b2876973262d2f84d9c07a1115fb983cbcf93bfe9b3679ca3406d5581fe

  • SHA512

    e2530ca4642f0190c55dbd2b8a5c0ee4078053cf0a6164c32b05adf5824c31c52f440f8c6b3eec6002f1ef200ed17a44e151067fa02d420830ab472ecc86d25c

  • SSDEEP

    1536:Gm8ODN688LEsqiAwzwrBFtn9+zgCR0kZ8RzQYg4/fyEeiLxPs360:D5KLEsXArZ9+0CpQzQEPg

Malware Config

Targets

    • Target

      6c7823ac11aecd6f900790c06e47c7f3_JaffaCakes118

    • Size

      94KB

    • MD5

      6c7823ac11aecd6f900790c06e47c7f3

    • SHA1

      eccfcec7462905d9e6f408710b69eb416497dd7d

    • SHA256

      a2466b2876973262d2f84d9c07a1115fb983cbcf93bfe9b3679ca3406d5581fe

    • SHA512

      e2530ca4642f0190c55dbd2b8a5c0ee4078053cf0a6164c32b05adf5824c31c52f440f8c6b3eec6002f1ef200ed17a44e151067fa02d420830ab472ecc86d25c

    • SSDEEP

      1536:Gm8ODN688LEsqiAwzwrBFtn9+zgCR0kZ8RzQYg4/fyEeiLxPs360:D5KLEsXArZ9+0CpQzQEPg

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks