General

  • Target

    9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118

  • Size

    6.7MB

  • Sample

    240611-awr28axejj

  • MD5

    9c73103c241d5a54e0957b68c6087fb5

  • SHA1

    8fe86a517e4dcc915f8670b6ea06ecb607511f4f

  • SHA256

    80c2930914430fb92e04f4764943bceb6304405424250da8a2ed0bb4e3dd8f9f

  • SHA512

    b1b2c413bfefe5c415a276a78d07885b8a8a3037c5916a3cb85efb755c89069f36d7088f1d7ff03fe4e70fb29df341e3c64deaaad761e637ffc93358e5e09680

  • SSDEEP

    196608:NkMZx9nNoD1CqOu2mFFO2enYXiNALfgIjDMmk+4WMQ:/jfbu2mFM23ikfVjY+qQ

Malware Config

Targets

    • Target

      9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118

    • Size

      6.7MB

    • MD5

      9c73103c241d5a54e0957b68c6087fb5

    • SHA1

      8fe86a517e4dcc915f8670b6ea06ecb607511f4f

    • SHA256

      80c2930914430fb92e04f4764943bceb6304405424250da8a2ed0bb4e3dd8f9f

    • SHA512

      b1b2c413bfefe5c415a276a78d07885b8a8a3037c5916a3cb85efb755c89069f36d7088f1d7ff03fe4e70fb29df341e3c64deaaad761e637ffc93358e5e09680

    • SSDEEP

      196608:NkMZx9nNoD1CqOu2mFFO2enYXiNALfgIjDMmk+4WMQ:/jfbu2mFM23ikfVjY+qQ

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks