General

  • Target

    6eb361b93dbafea69aeafa268660f167_JaffaCakes118

  • Size

    6.7MB

  • Sample

    240524-qycy3sfh6s

  • MD5

    6eb361b93dbafea69aeafa268660f167

  • SHA1

    e94b1b69bfa75705ab80833644914998e66af72c

  • SHA256

    c3bcb6c74144a22d9db1ebeb13478cbe41d61c3b7d248133e24d17737220eb15

  • SHA512

    95a6986a240159096c08142c94a078b61d4020a621ec1b0fc89507bab1c1c064d8ee189d7bee20147f69827072760b81ecb1b25871699c3a69bd34cdbc8aeb7e

  • SSDEEP

    196608:IFRKPKzLVAOwurx/nzMA7O2xbA4RSqWDDDeUcjkV:KRJV/zMA7O2xbAmWDhHV

Malware Config

Targets

    • Target

      6eb361b93dbafea69aeafa268660f167_JaffaCakes118

    • Size

      6.7MB

    • MD5

      6eb361b93dbafea69aeafa268660f167

    • SHA1

      e94b1b69bfa75705ab80833644914998e66af72c

    • SHA256

      c3bcb6c74144a22d9db1ebeb13478cbe41d61c3b7d248133e24d17737220eb15

    • SHA512

      95a6986a240159096c08142c94a078b61d4020a621ec1b0fc89507bab1c1c064d8ee189d7bee20147f69827072760b81ecb1b25871699c3a69bd34cdbc8aeb7e

    • SSDEEP

      196608:IFRKPKzLVAOwurx/nzMA7O2xbA4RSqWDDDeUcjkV:KRJV/zMA7O2xbAmWDhHV

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks