General

  • Target

    98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118

  • Size

    20.8MB

  • Sample

    240605-xj6q6sff52

  • MD5

    98f494f75a9fc2671fcc01e6e406da46

  • SHA1

    597748177f867f94331b79aac5f2a3aa28358fc7

  • SHA256

    36ab7a10740b39cb4e25fd66b5f4a2db280a963be8c646a659e58de76e2cef8f

  • SHA512

    35be13982bf3601332c05e7fccb713dce24de1bdac387d4e832cf5a6dc1d8f1d0752b9910bf137d404c51e9933c8533a781d4600988711dc4353aa5105d888aa

  • SSDEEP

    393216:2dnfiO7UZLkJMAyLUj/ieyIks8fdnFWckhP1JA/VNjvQ7gQ+8gTR2:2FXlMAgCjkVnQnJA/LQMQ+Y

Malware Config

Targets

    • Target

      98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118

    • Size

      20.8MB

    • MD5

      98f494f75a9fc2671fcc01e6e406da46

    • SHA1

      597748177f867f94331b79aac5f2a3aa28358fc7

    • SHA256

      36ab7a10740b39cb4e25fd66b5f4a2db280a963be8c646a659e58de76e2cef8f

    • SHA512

      35be13982bf3601332c05e7fccb713dce24de1bdac387d4e832cf5a6dc1d8f1d0752b9910bf137d404c51e9933c8533a781d4600988711dc4353aa5105d888aa

    • SSDEEP

      393216:2dnfiO7UZLkJMAyLUj/ieyIks8fdnFWckhP1JA/VNjvQ7gQ+8gTR2:2FXlMAgCjkVnQnJA/LQMQ+Y

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks