General

  • Target

    8b05da5fd3a234580d7ed4463da4cf83_JaffaCakes118

  • Size

    12.8MB

  • Sample

    240601-tssn5agd7v

  • MD5

    8b05da5fd3a234580d7ed4463da4cf83

  • SHA1

    1a3ed7b1153cd38162eb6fbad9aa1a772ebbeaf1

  • SHA256

    165111e44352189d4268986fb8fe7bc4f5910f32df5cac07dbf35ccfc4cd28cc

  • SHA512

    bc63df2275e1296c3c48287b31ce4a63fce8c91f797f83dbc46e9a07b8c448bc807f4d259cb689540d87a461514b2b4f1998a6413182f85bd8e9c2a6164f2b05

  • SSDEEP

    393216:dpGuBLnbbMPMG/PDyvxKq1+IvSiEljp3668EtpWJ:dxnboPMGjKK0qtKoWJ

Malware Config

Targets

    • Target

      8b05da5fd3a234580d7ed4463da4cf83_JaffaCakes118

    • Size

      12.8MB

    • MD5

      8b05da5fd3a234580d7ed4463da4cf83

    • SHA1

      1a3ed7b1153cd38162eb6fbad9aa1a772ebbeaf1

    • SHA256

      165111e44352189d4268986fb8fe7bc4f5910f32df5cac07dbf35ccfc4cd28cc

    • SHA512

      bc63df2275e1296c3c48287b31ce4a63fce8c91f797f83dbc46e9a07b8c448bc807f4d259cb689540d87a461514b2b4f1998a6413182f85bd8e9c2a6164f2b05

    • SSDEEP

      393216:dpGuBLnbbMPMG/PDyvxKq1+IvSiEljp3668EtpWJ:dxnboPMGjKK0qtKoWJ

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks