General

  • Target

    712e59568cc074818b61d0e3939c6cb1_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240525-hpvtjahh98

  • MD5

    712e59568cc074818b61d0e3939c6cb1

  • SHA1

    f87588f48dcb6e491a1cc886b3b3a2e7df2745e3

  • SHA256

    f0194e0809a36795b72489f6b313ee2ff909825afd168cfc8e2700d4c8485675

  • SHA512

    85586a69c7e1c02c4398e43130b7843c2a1e99a77d81f98da755949812eb3333e9711266bee65e065f5be5842192358207cb3be2ea2ed0bd64710e6bb2cd2a43

  • SSDEEP

    196608:1+0vDuLdSEzqM64mp9NN1ve/cRSZQZDS6+JNV2InMq:1+0vDuLsKqj4s7Ns/cRGQ1HOVWq

Malware Config

Targets

    • Target

      712e59568cc074818b61d0e3939c6cb1_JaffaCakes118

    • Size

      8.4MB

    • MD5

      712e59568cc074818b61d0e3939c6cb1

    • SHA1

      f87588f48dcb6e491a1cc886b3b3a2e7df2745e3

    • SHA256

      f0194e0809a36795b72489f6b313ee2ff909825afd168cfc8e2700d4c8485675

    • SHA512

      85586a69c7e1c02c4398e43130b7843c2a1e99a77d81f98da755949812eb3333e9711266bee65e065f5be5842192358207cb3be2ea2ed0bd64710e6bb2cd2a43

    • SSDEEP

      196608:1+0vDuLdSEzqM64mp9NN1ve/cRSZQZDS6+JNV2InMq:1+0vDuLsKqj4s7Ns/cRGQ1HOVWq

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks