General

  • Target

    9e8ca7418f592a06987656a18036211d_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240611-r32cxa1apa

  • MD5

    9e8ca7418f592a06987656a18036211d

  • SHA1

    034d4c466dc8684da1776eb4667eb8a22ea05d21

  • SHA256

    70c4156ca1ddb55c894c0980d90ec4ad637af40b1d57e566097c51179d1a8811

  • SHA512

    ead418582ca69c54dc1ecec9a7884c764cd693a4632e3e0913e8ae1a0fc9c3d032c232d5c6ba5a8d419a87114290146bfc8478020477263ba52a5cfe9dca5421

  • SSDEEP

    98304:fj/tJdCboe7rLmLmgAjvHAgvxKG/s+TFMn9:Zje7TgArg2xBTFc

Malware Config

Targets

    • Target

      9e8ca7418f592a06987656a18036211d_JaffaCakes118

    • Size

      3.7MB

    • MD5

      9e8ca7418f592a06987656a18036211d

    • SHA1

      034d4c466dc8684da1776eb4667eb8a22ea05d21

    • SHA256

      70c4156ca1ddb55c894c0980d90ec4ad637af40b1d57e566097c51179d1a8811

    • SHA512

      ead418582ca69c54dc1ecec9a7884c764cd693a4632e3e0913e8ae1a0fc9c3d032c232d5c6ba5a8d419a87114290146bfc8478020477263ba52a5cfe9dca5421

    • SSDEEP

      98304:fj/tJdCboe7rLmLmgAjvHAgvxKG/s+TFMn9:Zje7TgArg2xBTFc

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks