General

  • Target

    6cb67cbc7a3abdc1256518063b78e9b2_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240523-317bxsea6s

  • MD5

    6cb67cbc7a3abdc1256518063b78e9b2

  • SHA1

    6e4f42b742fb135c7496f3072bc6e8026c33db30

  • SHA256

    0c158c4aeb7f2050ba53fa14cc662fe8490abe64071a46d6bd43d2ef67499c38

  • SHA512

    4e08f7075d77df91a28db0255434f368a12b74e3287a7ab64dbc43cd0f285ba21f92bba2714e1d556a48a981862f8c8d65398ccc98e3be6201314f7f916032db

  • SSDEEP

    196608:YIAk7nQtr7BWdlIAk7nQtr7BWdOIAk7nQtr7BWd4IAk7nQtr7BWdqIAk7nQtr7Bt:BQtBWdOQtBWd/QtBWdhQtBWd7QtBWdq

Malware Config

Targets

    • Target

      6cb67cbc7a3abdc1256518063b78e9b2_JaffaCakes118

    • Size

      12.3MB

    • MD5

      6cb67cbc7a3abdc1256518063b78e9b2

    • SHA1

      6e4f42b742fb135c7496f3072bc6e8026c33db30

    • SHA256

      0c158c4aeb7f2050ba53fa14cc662fe8490abe64071a46d6bd43d2ef67499c38

    • SHA512

      4e08f7075d77df91a28db0255434f368a12b74e3287a7ab64dbc43cd0f285ba21f92bba2714e1d556a48a981862f8c8d65398ccc98e3be6201314f7f916032db

    • SSDEEP

      196608:YIAk7nQtr7BWdlIAk7nQtr7BWdOIAk7nQtr7BWd4IAk7nQtr7BWdqIAk7nQtr7Bt:BQtBWdOQtBWd/QtBWdhQtBWd7QtBWdq

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks