General

  • Target

    a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118

  • Size

    27.7MB

  • Sample

    240614-pb3qjstepq

  • MD5

    a99b4e54ceee99b71fcd207ad7c951cd

  • SHA1

    5063668700f6c9661edee34cc9d21957a836f4cc

  • SHA256

    8924ee0f4d895ce882b2e3cc5cab97663c8217fa232cc4e361cf2e3234c7dd94

  • SHA512

    457ef6b062374522c5e8e4c7704ab73cdbe81056c3f3d6287d0c886cdaa9661532df3270e419146cc47ffc9cd89e2df78cd03207f89dc4ba9e7977959dc30fdd

  • SSDEEP

    786432:qPsPZA40XOvBCJsVw/K7pD2BpwaXRkM70y:nTBCOo4x2FXOMl

Malware Config

Targets

    • Target

      a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118

    • Size

      27.7MB

    • MD5

      a99b4e54ceee99b71fcd207ad7c951cd

    • SHA1

      5063668700f6c9661edee34cc9d21957a836f4cc

    • SHA256

      8924ee0f4d895ce882b2e3cc5cab97663c8217fa232cc4e361cf2e3234c7dd94

    • SHA512

      457ef6b062374522c5e8e4c7704ab73cdbe81056c3f3d6287d0c886cdaa9661532df3270e419146cc47ffc9cd89e2df78cd03207f89dc4ba9e7977959dc30fdd

    • SSDEEP

      786432:qPsPZA40XOvBCJsVw/K7pD2BpwaXRkM70y:nTBCOo4x2FXOMl

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks