General

  • Target

    9d630872f0b900773b681dcc81f24efc_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240611-h1pfwsyhnr

  • MD5

    9d630872f0b900773b681dcc81f24efc

  • SHA1

    a575cc6ef396eca8168d96250f4376d0c47264a5

  • SHA256

    fe82930171c52fb55a28fd17f40489816268dfb082931e1a404e43689c703879

  • SHA512

    d6d618b99ff2957b114fea40505bf0c0d0ee11ac10a3f5bfa351706819e761118e6b4b2b5b47882130c8470de4736acaa63c7b054619cc7e59f5a748e008c561

  • SSDEEP

    98304:o9drTLh7pUcxh7EMEjzeJ8p++qc1v8qKeL3jzJDfYIfqFrVUr5owx9zf0NYAg:oNhozeJO+bcpJrxTYIKrVUl5f0Kv

Malware Config

Targets

    • Target

      9d630872f0b900773b681dcc81f24efc_JaffaCakes118

    • Size

      6.1MB

    • MD5

      9d630872f0b900773b681dcc81f24efc

    • SHA1

      a575cc6ef396eca8168d96250f4376d0c47264a5

    • SHA256

      fe82930171c52fb55a28fd17f40489816268dfb082931e1a404e43689c703879

    • SHA512

      d6d618b99ff2957b114fea40505bf0c0d0ee11ac10a3f5bfa351706819e761118e6b4b2b5b47882130c8470de4736acaa63c7b054619cc7e59f5a748e008c561

    • SSDEEP

      98304:o9drTLh7pUcxh7EMEjzeJ8p++qc1v8qKeL3jzJDfYIfqFrVUr5owx9zf0NYAg:oNhozeJO+bcpJrxTYIKrVUl5f0Kv

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks