General

  • Target

    8282dee6c477a90d43b6d52dcbf23fc6_JaffaCakes118

  • Size

    302KB

  • Sample

    240530-avfykaff8z

  • MD5

    8282dee6c477a90d43b6d52dcbf23fc6

  • SHA1

    301d36f92b4227b20cbae749ed15c7d1ebf37636

  • SHA256

    53d4166c250b9b6d91179d6059835059a988704afdc8e3d9abe5b7e51848bdbb

  • SHA512

    4e477e99928b86af8396b6e945ce9478c4224174409f02dcafee0136f2c4a841e7b3c912d9ce9beea6c24e812045f24bd6e3eca5df7e4ae63465c587bfce7db0

  • SSDEEP

    6144:IbYoeGof5OydPaFVbYrsaix7U6fFlwPU8U6qQvTrvRKofMnfY3:IbZAfIydSPYrtQf6qQvTrZNUfY3

Malware Config

Targets

    • Target

      8282dee6c477a90d43b6d52dcbf23fc6_JaffaCakes118

    • Size

      302KB

    • MD5

      8282dee6c477a90d43b6d52dcbf23fc6

    • SHA1

      301d36f92b4227b20cbae749ed15c7d1ebf37636

    • SHA256

      53d4166c250b9b6d91179d6059835059a988704afdc8e3d9abe5b7e51848bdbb

    • SHA512

      4e477e99928b86af8396b6e945ce9478c4224174409f02dcafee0136f2c4a841e7b3c912d9ce9beea6c24e812045f24bd6e3eca5df7e4ae63465c587bfce7db0

    • SSDEEP

      6144:IbYoeGof5OydPaFVbYrsaix7U6fFlwPU8U6qQvTrvRKofMnfY3:IbZAfIydSPYrtQf6qQvTrZNUfY3

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks