General

  • Target

    9b456ae02e43469e18c6e280c7d12892_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240610-tp5vaasglf

  • MD5

    9b456ae02e43469e18c6e280c7d12892

  • SHA1

    86a3085d48682fd81a54236704e0e117872a4b5c

  • SHA256

    caa074e0c9c6a2fa4ee6586ec406be22a76d9d3fed45ee204ea4a5721cf74ade

  • SHA512

    01984d4333f2be75ae43aeaa038dffee5a14df79763d8c7ef8961a4b5e164d194e43a70a8a2ebccb986e3c310c6a3bc5a1c7bcb4df33f61faacd18f5dbf9765c

  • SSDEEP

    24576:8cRTrlo0ur/w86A5EhkYpxQVmrFL4PCQfUD0Gf3OH3Rlgmi:zRXlo9/waCAgrFL4PRArfeXRlgmi

Malware Config

Targets

    • Target

      9b456ae02e43469e18c6e280c7d12892_JaffaCakes118

    • Size

      1.1MB

    • MD5

      9b456ae02e43469e18c6e280c7d12892

    • SHA1

      86a3085d48682fd81a54236704e0e117872a4b5c

    • SHA256

      caa074e0c9c6a2fa4ee6586ec406be22a76d9d3fed45ee204ea4a5721cf74ade

    • SHA512

      01984d4333f2be75ae43aeaa038dffee5a14df79763d8c7ef8961a4b5e164d194e43a70a8a2ebccb986e3c310c6a3bc5a1c7bcb4df33f61faacd18f5dbf9765c

    • SSDEEP

      24576:8cRTrlo0ur/w86A5EhkYpxQVmrFL4PCQfUD0Gf3OH3Rlgmi:zRXlo9/waCAgrFL4PRArfeXRlgmi

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks