General

  • Target

    9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240611-bnx4yaybrf

  • MD5

    9c8d7f1b106804b81f2ac9f4299541a2

  • SHA1

    9a567e9210908ebb3aea9d0a52dfc6b0d3359ea3

  • SHA256

    e839085fd6b075132f9f84123cd77f1c7afd3728e88826ee53e83f3f4fdfff08

  • SHA512

    3b3ec71414b20c1a9a2a103c79298766ab11ee884843eda40c4ca7a3f5c848de295010e16e00304f2134823253f6da54580e8657d3d6df1bd7b5ff3774e1fd8a

  • SSDEEP

    196608:pQZhozep0YsypOGlavY8M1nHFr45dxHGSf0Kc:pQk4xJl421HFk5dxmSf5c

Malware Config

Targets

    • Target

      9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118

    • Size

      6.1MB

    • MD5

      9c8d7f1b106804b81f2ac9f4299541a2

    • SHA1

      9a567e9210908ebb3aea9d0a52dfc6b0d3359ea3

    • SHA256

      e839085fd6b075132f9f84123cd77f1c7afd3728e88826ee53e83f3f4fdfff08

    • SHA512

      3b3ec71414b20c1a9a2a103c79298766ab11ee884843eda40c4ca7a3f5c848de295010e16e00304f2134823253f6da54580e8657d3d6df1bd7b5ff3774e1fd8a

    • SSDEEP

      196608:pQZhozep0YsypOGlavY8M1nHFr45dxHGSf0Kc:pQk4xJl421HFk5dxmSf5c

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks