General

  • Target

    6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240523-znrtxsga2x

  • MD5

    6c382b1afcefa0a6fe12926cbd014958

  • SHA1

    a289cb96ad2320f2448334b4fa72466046bb95ab

  • SHA256

    1a0ec944618778ddafaaa291b364106b8c36ff76a1818b918219d8046ae30e9d

  • SHA512

    0e100dd6a19fc266fcd8bdac7532343fb6f9bf576c98f3a15dbc12b4d53c130d7a9f986218359fd8deef204d19dfdcc8693cd768ae34046522ca10842da54ebd

  • SSDEEP

    49152:Fu283rlE6u7oYr0FfjzGAwb6c/X1E0QnwQw/wb73ZUA:Fu28ju7oY4FXGdb6ca1nb6G

Malware Config

Targets

    • Target

      6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118

    • Size

      1.9MB

    • MD5

      6c382b1afcefa0a6fe12926cbd014958

    • SHA1

      a289cb96ad2320f2448334b4fa72466046bb95ab

    • SHA256

      1a0ec944618778ddafaaa291b364106b8c36ff76a1818b918219d8046ae30e9d

    • SHA512

      0e100dd6a19fc266fcd8bdac7532343fb6f9bf576c98f3a15dbc12b4d53c130d7a9f986218359fd8deef204d19dfdcc8693cd768ae34046522ca10842da54ebd

    • SSDEEP

      49152:Fu283rlE6u7oYr0FfjzGAwb6c/X1E0QnwQw/wb73ZUA:Fu28ju7oY4FXGdb6ca1nb6G

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks