General

  • Target

    9bfcd2472a9e7d4ec3dcfa8525c1830c_JaffaCakes118

  • Size

    6.5MB

  • Sample

    240610-1ax98a1gnj

  • MD5

    9bfcd2472a9e7d4ec3dcfa8525c1830c

  • SHA1

    687d2abf62e6677d93379af82811474469eb0855

  • SHA256

    9735a951e9e84799e1f81ca047a6f6d684b0c4ae82c4675a24a0cdb698e02cad

  • SHA512

    aeb2efc09a47759c6fa74211a637c2391009eb7fe41d9942836de4d2ffd28d077a429523bfafa8c706cba725c3536c64823d6a7bd7b8f05d466a29269f14d577

  • SSDEEP

    98304:nz2Qj6hvYdkui2HbI9cX+i+gVoXCrayysKT+1mo8CYmQLeTUqo+i2KUV:TY6Ti27Iyn+tXdyZd4CYZLRqoTFUV

Malware Config

Targets

    • Target

      9bfcd2472a9e7d4ec3dcfa8525c1830c_JaffaCakes118

    • Size

      6.5MB

    • MD5

      9bfcd2472a9e7d4ec3dcfa8525c1830c

    • SHA1

      687d2abf62e6677d93379af82811474469eb0855

    • SHA256

      9735a951e9e84799e1f81ca047a6f6d684b0c4ae82c4675a24a0cdb698e02cad

    • SHA512

      aeb2efc09a47759c6fa74211a637c2391009eb7fe41d9942836de4d2ffd28d077a429523bfafa8c706cba725c3536c64823d6a7bd7b8f05d466a29269f14d577

    • SSDEEP

      98304:nz2Qj6hvYdkui2HbI9cX+i+gVoXCrayysKT+1mo8CYmQLeTUqo+i2KUV:TY6Ti27Iyn+tXdyZd4CYZLRqoTFUV

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks