General

  • Target

    ab3a63bfefc225c181656ea8ee256264_JaffaCakes118

  • Size

    6.5MB

  • Sample

    240614-ys4hvateqa

  • MD5

    ab3a63bfefc225c181656ea8ee256264

  • SHA1

    ec6ee1d91d88a9a9fc1e765772b23663de4ad5ff

  • SHA256

    0cd1d6042f0ef661f9cbd9238b699ff1bde5d249db169a26555543515f3d64c9

  • SHA512

    3a76adc6bdc6e55d4190d00f6e9cb95dc2879c7798541eeaf9421ade6474fb6fc0d8a07ee36af04c32ba3e325b83ec71346f448f4413834d377f7863ba2d1c85

  • SSDEEP

    196608:fElsAkmmXElD9LqsjdeHGODM9qCQtHwuiwzjyoDfS0e5IU7UcndllzVeXXkHbYUA:fElsAkmmXeDd9oHjxXyov

Malware Config

Targets

    • Target

      ab3a63bfefc225c181656ea8ee256264_JaffaCakes118

    • Size

      6.5MB

    • MD5

      ab3a63bfefc225c181656ea8ee256264

    • SHA1

      ec6ee1d91d88a9a9fc1e765772b23663de4ad5ff

    • SHA256

      0cd1d6042f0ef661f9cbd9238b699ff1bde5d249db169a26555543515f3d64c9

    • SHA512

      3a76adc6bdc6e55d4190d00f6e9cb95dc2879c7798541eeaf9421ade6474fb6fc0d8a07ee36af04c32ba3e325b83ec71346f448f4413834d377f7863ba2d1c85

    • SSDEEP

      196608:fElsAkmmXElD9LqsjdeHGODM9qCQtHwuiwzjyoDfS0e5IU7UcndllzVeXXkHbYUA:fElsAkmmXeDd9oHjxXyov

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks