General

  • Target

    907a44e5dcca9acd99a7f3b37eef6922_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240603-emkn1aaf61

  • MD5

    907a44e5dcca9acd99a7f3b37eef6922

  • SHA1

    e4a57ed57d0db53aa9c9066beb6932fcbbaed0a6

  • SHA256

    dbfb308d6dfd15bd3275ae40d5c7c650d7c0071025245f4f2e7abdd0459ed09a

  • SHA512

    35697d4cc4b05ccf56a513b6d4c2d4a8cbb1deb1b8280ccd0ce6f471219d413bb35ae37b3077844fb92c8b5cb3dd3aff3cb9c382fa874d4fee5252c9c702ebac

  • SSDEEP

    49152:Yx0NvMeqg5QbbRe9yytrcfIsgRcM8rcymHySy1/xWQc:a0N+g7brcfaX

Malware Config

Targets

    • Target

      907a44e5dcca9acd99a7f3b37eef6922_JaffaCakes118

    • Size

      1.7MB

    • MD5

      907a44e5dcca9acd99a7f3b37eef6922

    • SHA1

      e4a57ed57d0db53aa9c9066beb6932fcbbaed0a6

    • SHA256

      dbfb308d6dfd15bd3275ae40d5c7c650d7c0071025245f4f2e7abdd0459ed09a

    • SHA512

      35697d4cc4b05ccf56a513b6d4c2d4a8cbb1deb1b8280ccd0ce6f471219d413bb35ae37b3077844fb92c8b5cb3dd3aff3cb9c382fa874d4fee5252c9c702ebac

    • SSDEEP

      49152:Yx0NvMeqg5QbbRe9yytrcfIsgRcM8rcymHySy1/xWQc:a0N+g7brcfaX

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks