General

  • Target

    6dd909ab5fc66737d352ac8053af6e3d_JaffaCakes118

  • Size

    307KB

  • Sample

    240524-j34t2aag9s

  • MD5

    6dd909ab5fc66737d352ac8053af6e3d

  • SHA1

    9276b6a9840e7e5c06bc0243d7c4e22e76444099

  • SHA256

    c35bc9c550f38f5ed46681e0f43265e1da87384dad3f2f585bad09a3c03188ea

  • SHA512

    cc01e8341dd6e9a2c1623e067559e3ed8e82c26133365cba8450d70a892fef025ef991d19503f8df0106dfa936d559ea2991e1ae7bab1be34d9c6dc8aeb467b9

  • SSDEEP

    6144:9VRnz26En9QKl3GQERlPhlP+4g73KnVHrGoHD8OAApWkQFtzg:HA6EmRlPbPPVyoHD8hApgzg

Malware Config

Targets

    • Target

      6dd909ab5fc66737d352ac8053af6e3d_JaffaCakes118

    • Size

      307KB

    • MD5

      6dd909ab5fc66737d352ac8053af6e3d

    • SHA1

      9276b6a9840e7e5c06bc0243d7c4e22e76444099

    • SHA256

      c35bc9c550f38f5ed46681e0f43265e1da87384dad3f2f585bad09a3c03188ea

    • SHA512

      cc01e8341dd6e9a2c1623e067559e3ed8e82c26133365cba8450d70a892fef025ef991d19503f8df0106dfa936d559ea2991e1ae7bab1be34d9c6dc8aeb467b9

    • SSDEEP

      6144:9VRnz26En9QKl3GQERlPhlP+4g73KnVHrGoHD8OAApWkQFtzg:HA6EmRlPbPPVyoHD8hApgzg

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks