General

  • Target

    6b53e1eefb9f15ad14837b15020ae2e1_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240523-se9vtafb9s

  • MD5

    6b53e1eefb9f15ad14837b15020ae2e1

  • SHA1

    23867811f686022500247a1b953455fe8035505c

  • SHA256

    996ca08a176d2a5918b02596f572605109365c102bc4c422636f540e1c481ac7

  • SHA512

    9bc864c1ed13a7e5dc7cf3276a264e7e62b536557646c90d3ec313bcd1f401293a22e90820300b3d64a898136775c155de55b0a6b9d71c42b394b3bac5746249

  • SSDEEP

    49152:btuWYSFPW7RMTo/IvI6ABK6Pouc2GM9flI:HTFP2RWvIdUOouc1Qfq

Malware Config

Targets

    • Target

      6b53e1eefb9f15ad14837b15020ae2e1_JaffaCakes118

    • Size

      1.7MB

    • MD5

      6b53e1eefb9f15ad14837b15020ae2e1

    • SHA1

      23867811f686022500247a1b953455fe8035505c

    • SHA256

      996ca08a176d2a5918b02596f572605109365c102bc4c422636f540e1c481ac7

    • SHA512

      9bc864c1ed13a7e5dc7cf3276a264e7e62b536557646c90d3ec313bcd1f401293a22e90820300b3d64a898136775c155de55b0a6b9d71c42b394b3bac5746249

    • SSDEEP

      49152:btuWYSFPW7RMTo/IvI6ABK6Pouc2GM9flI:HTFP2RWvIdUOouc1Qfq

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks