General

  • Target

    91d89ced89288616929cb874dd5f6562_JaffaCakes118

  • Size

    19.1MB

  • Sample

    240603-p3b2xafa4z

  • MD5

    91d89ced89288616929cb874dd5f6562

  • SHA1

    937970af59d7afbbd69a6a08ef7eb87f3824d1e2

  • SHA256

    754ab5157fa386ee65caca89107c5008769c86098c9ed0f23ce3a041543a0f4a

  • SHA512

    f978ef53a68fac3aa4c246e25e32d73474118725ce29970f8d4fc4b03344cc9d9b3f9cdb753921447ec4507494174b19bf7aee005a702bfaaf9f0e56c734b733

  • SSDEEP

    393216:axkmgMb7jSsqzeAxkwbSyZbm/zfHaB5gKyJ4PwL2nWpDao6h5D:9++/efwG4bmjGXQ2Wpr6h9

Malware Config

Targets

    • Target

      91d89ced89288616929cb874dd5f6562_JaffaCakes118

    • Size

      19.1MB

    • MD5

      91d89ced89288616929cb874dd5f6562

    • SHA1

      937970af59d7afbbd69a6a08ef7eb87f3824d1e2

    • SHA256

      754ab5157fa386ee65caca89107c5008769c86098c9ed0f23ce3a041543a0f4a

    • SHA512

      f978ef53a68fac3aa4c246e25e32d73474118725ce29970f8d4fc4b03344cc9d9b3f9cdb753921447ec4507494174b19bf7aee005a702bfaaf9f0e56c734b733

    • SSDEEP

      393216:axkmgMb7jSsqzeAxkwbSyZbm/zfHaB5gKyJ4PwL2nWpDao6h5D:9++/efwG4bmjGXQ2Wpr6h9

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks