General

  • Target

    aa3e1426011603758c9f516b356dc76b_JaffaCakes118

  • Size

    25.1MB

  • Sample

    240614-r4k3bayeqk

  • MD5

    aa3e1426011603758c9f516b356dc76b

  • SHA1

    2f89f00a18371ea23ce687164b9b298090e8999f

  • SHA256

    e8da1a8e4f74ca73795c4f3544a21c238aedbef3342dd1b08b252a53fc149e58

  • SHA512

    6118bd6f11893e0e1b57296c6ba447d5b5bfbf2a9508a094c49a326adfe121210357e2187d57fce73679972b0d856b3b151904cdd30404afc1425600cf503357

  • SSDEEP

    786432:vcTYo9PYBxyLQ9pS6QWKBilaovSSQ0ykr6:vcjhAyLQvJhrl7Smr6

Malware Config

Targets

    • Target

      aa3e1426011603758c9f516b356dc76b_JaffaCakes118

    • Size

      25.1MB

    • MD5

      aa3e1426011603758c9f516b356dc76b

    • SHA1

      2f89f00a18371ea23ce687164b9b298090e8999f

    • SHA256

      e8da1a8e4f74ca73795c4f3544a21c238aedbef3342dd1b08b252a53fc149e58

    • SHA512

      6118bd6f11893e0e1b57296c6ba447d5b5bfbf2a9508a094c49a326adfe121210357e2187d57fce73679972b0d856b3b151904cdd30404afc1425600cf503357

    • SSDEEP

      786432:vcTYo9PYBxyLQ9pS6QWKBilaovSSQ0ykr6:vcjhAyLQvJhrl7Smr6

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks