General

  • Target

    89edd9e748963766f789fc0714b2ff9b_JaffaCakes118

  • Size

    6.8MB

  • Sample

    240601-kq3a4sgf78

  • MD5

    89edd9e748963766f789fc0714b2ff9b

  • SHA1

    a685aba306379aa390795854fa746787c7c3dd76

  • SHA256

    b1c5f2640ce29f58c7b36417ec844a1cbb133b340a280e71e5cc3ff95d5b9e54

  • SHA512

    5e18848bdc396309483b1e809adfe9fb5e1372cc2ea62ffa8dd6314661fe5f3572dbb07eae847dbac61adde626cd917069bbf3feac51e06c5341adcb34d65296

  • SSDEEP

    196608:/GEPZCOmjn0gVeft+whpbGb2aexx1txg6as3l:21Fk+ib0ex1k6aO

Malware Config

Targets

    • Target

      89edd9e748963766f789fc0714b2ff9b_JaffaCakes118

    • Size

      6.8MB

    • MD5

      89edd9e748963766f789fc0714b2ff9b

    • SHA1

      a685aba306379aa390795854fa746787c7c3dd76

    • SHA256

      b1c5f2640ce29f58c7b36417ec844a1cbb133b340a280e71e5cc3ff95d5b9e54

    • SHA512

      5e18848bdc396309483b1e809adfe9fb5e1372cc2ea62ffa8dd6314661fe5f3572dbb07eae847dbac61adde626cd917069bbf3feac51e06c5341adcb34d65296

    • SSDEEP

      196608:/GEPZCOmjn0gVeft+whpbGb2aexx1txg6as3l:21Fk+ib0ex1k6aO

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks