General

  • Target

    820f46eca72897a7738b3b5c2526063d_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240529-1rbgsabh87

  • MD5

    820f46eca72897a7738b3b5c2526063d

  • SHA1

    f3b87b5fc4837ec752357f6536639f91c7400840

  • SHA256

    51c3fed39510f9b0af862b8552294ceae6aeed6fc879cca6b53379e099d58301

  • SHA512

    9900dfe6793e73756ad864409fbc478529c17df00caa5f57eac01719a823d1195730790d70b46584a03f4f3ed2f1b829e2be9be2f40a5bb1d964ad3471df609e

  • SSDEEP

    49152:4qNGWEGPFJT6sdThCO2JK1H0jw878KQm73ZGj:4qo+9JjdlCOmn78zJ

Malware Config

Targets

    • Target

      820f46eca72897a7738b3b5c2526063d_JaffaCakes118

    • Size

      1.9MB

    • MD5

      820f46eca72897a7738b3b5c2526063d

    • SHA1

      f3b87b5fc4837ec752357f6536639f91c7400840

    • SHA256

      51c3fed39510f9b0af862b8552294ceae6aeed6fc879cca6b53379e099d58301

    • SHA512

      9900dfe6793e73756ad864409fbc478529c17df00caa5f57eac01719a823d1195730790d70b46584a03f4f3ed2f1b829e2be9be2f40a5bb1d964ad3471df609e

    • SSDEEP

      49152:4qNGWEGPFJT6sdThCO2JK1H0jw878KQm73ZGj:4qo+9JjdlCOmn78zJ

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks