General

  • Target

    9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240605-sakecsba49

  • MD5

    9870f51b14e094351f779eaa7f6e13e7

  • SHA1

    e38efb7aa8bd2ede2ea177cf6506694b4dbca7e6

  • SHA256

    ac9bd2769aba08047346d99326a20e5ad42c4990f172d84aecd0633de9a533de

  • SHA512

    ff430987e821d2919ff532acdf4d8fd1956ed1e64d09e25a0c3a860969ece608913d7bc31825fc0347c973ee2f9ea9799e98310f421aef1350d785d1f4a56a48

  • SSDEEP

    49152:dubfats2Q2nQtVDvtj2GbGKQGVtlASV5bk7kCn:kj0s2Q4IR24GdyA4k7k0

Malware Config

Targets

    • Target

      9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118

    • Size

      2.0MB

    • MD5

      9870f51b14e094351f779eaa7f6e13e7

    • SHA1

      e38efb7aa8bd2ede2ea177cf6506694b4dbca7e6

    • SHA256

      ac9bd2769aba08047346d99326a20e5ad42c4990f172d84aecd0633de9a533de

    • SHA512

      ff430987e821d2919ff532acdf4d8fd1956ed1e64d09e25a0c3a860969ece608913d7bc31825fc0347c973ee2f9ea9799e98310f421aef1350d785d1f4a56a48

    • SSDEEP

      49152:dubfats2Q2nQtVDvtj2GbGKQGVtlASV5bk7kCn:kj0s2Q4IR24GdyA4k7k0

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks