General

  • Target

    6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240523-snbdlsfe57

  • MD5

    6b5b879e6029fd20d7a01bea3efc1313

  • SHA1

    99dd9c3c0af157a0565a0f516552d1999a3bf092

  • SHA256

    ca6c6007727514ac10ddd61d5d9b85854b17026dd5eb89cc15a69dc2e93cf0b4

  • SHA512

    1713355cae8107c1de03e9e484c018c00db8ee05058d7822a8dbfb864e79df7041d865978cc3a834eddbe847ab5fee587456cf02f08a799dc4326ce768cb2745

  • SSDEEP

    49152:AOonvjLZ2CYTGnUKhOd2xMSA0Vuld7ydbfQ0QR2S73ZGB:AOonoClPoqW7kb41Ql

Malware Config

Targets

    • Target

      6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118

    • Size

      1.9MB

    • MD5

      6b5b879e6029fd20d7a01bea3efc1313

    • SHA1

      99dd9c3c0af157a0565a0f516552d1999a3bf092

    • SHA256

      ca6c6007727514ac10ddd61d5d9b85854b17026dd5eb89cc15a69dc2e93cf0b4

    • SHA512

      1713355cae8107c1de03e9e484c018c00db8ee05058d7822a8dbfb864e79df7041d865978cc3a834eddbe847ab5fee587456cf02f08a799dc4326ce768cb2745

    • SSDEEP

      49152:AOonvjLZ2CYTGnUKhOd2xMSA0Vuld7ydbfQ0QR2S73ZGB:AOonoClPoqW7kb41Ql

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks