General

  • Target

    99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118

  • Size

    14.7MB

  • Sample

    240606-a5a53adh93

  • MD5

    99a753bd1f2d5dc1bd6cbe047b25d92d

  • SHA1

    6a3c406dfaf05e7f90f999ab652b4c2e52155fcf

  • SHA256

    ba6ffd7368be839a6888c2074afb8974b7fd429f63cb64f2c0ee1592b27c5fa5

  • SHA512

    291d266c69fc61763ce8db23164fc5e2977091a5697d89758289afedddef30773fac46b508291d4b385439f4d27008e5baa88a596bf611638bc404530755621c

  • SSDEEP

    196608:21u+HnDZLB7HyjF7s6+a03hL3H8n/6Lxgk03hL3H8n/6Lxgm5mpWj0Oyfy0OyfP:InDjASLMnGxgkSLMnGxgm+FfDFfP

Malware Config

Targets

    • Target

      99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118

    • Size

      14.7MB

    • MD5

      99a753bd1f2d5dc1bd6cbe047b25d92d

    • SHA1

      6a3c406dfaf05e7f90f999ab652b4c2e52155fcf

    • SHA256

      ba6ffd7368be839a6888c2074afb8974b7fd429f63cb64f2c0ee1592b27c5fa5

    • SHA512

      291d266c69fc61763ce8db23164fc5e2977091a5697d89758289afedddef30773fac46b508291d4b385439f4d27008e5baa88a596bf611638bc404530755621c

    • SSDEEP

      196608:21u+HnDZLB7HyjF7s6+a03hL3H8n/6Lxgk03hL3H8n/6Lxgm5mpWj0Oyfy0OyfP:InDjASLMnGxgkSLMnGxgm+FfDFfP

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks