General

  • Target

    a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118

  • Size

    30.9MB

  • Sample

    240614-j68x6asbma

  • MD5

    a8b2c7c244518b9cff8ff6620d176333

  • SHA1

    3cc0b258f64bf9784c447d7decefa02874207908

  • SHA256

    9d2ce612426fa45aaf1a5e533ff1ddca698543753f1fbb20156c3af62fbc3103

  • SHA512

    df1430a20ce8b3c769b9d40fc2008d763b05d73310638bfd3b6aa9a645b2609b93a24a163c58d80d7ff68abae41aa2e2c9c817dc4031b168caa25515f6bafe79

  • SSDEEP

    786432:saN+RH+Y/w9Ixvg4/cwkHVVhVVvtJPP5ZSu2:saN+ReRixt/0tPvtRx12

Malware Config

Targets

    • Target

      a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118

    • Size

      30.9MB

    • MD5

      a8b2c7c244518b9cff8ff6620d176333

    • SHA1

      3cc0b258f64bf9784c447d7decefa02874207908

    • SHA256

      9d2ce612426fa45aaf1a5e533ff1ddca698543753f1fbb20156c3af62fbc3103

    • SHA512

      df1430a20ce8b3c769b9d40fc2008d763b05d73310638bfd3b6aa9a645b2609b93a24a163c58d80d7ff68abae41aa2e2c9c817dc4031b168caa25515f6bafe79

    • SSDEEP

      786432:saN+RH+Y/w9Ixvg4/cwkHVVhVVvtJPP5ZSu2:saN+ReRixt/0tPvtRx12

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks