General

  • Target

    ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118

  • Size

    10.5MB

  • Sample

    240615-l4j75azfjr

  • MD5

    ade90179ed7e610c2a0a291fcba83fd7

  • SHA1

    97afbb00253bd5e2770b13683b69708d69de7017

  • SHA256

    43609fa48603c1cc9af8d92aa86c4b105497abc38f73cb8fa90d5b2eab3db692

  • SHA512

    80be3ec03b184134c41894df5e54c5208884f1fdd589404f8dbf77c56fba7024186f9b67b5607bf1313d79831bddcaca1912fc14d5a205adfbabbc63bddec59b

  • SSDEEP

    196608:bf7KZOrr3vrLxxX8IxTHvzHamKvSMc0ub+93NFB0H9JtOYQzM9kfXlBlLseXzrR:iIff3xJ8IxvHYv7399Y0YQzH1LLVXHR

Malware Config

Targets

    • Target

      ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118

    • Size

      10.5MB

    • MD5

      ade90179ed7e610c2a0a291fcba83fd7

    • SHA1

      97afbb00253bd5e2770b13683b69708d69de7017

    • SHA256

      43609fa48603c1cc9af8d92aa86c4b105497abc38f73cb8fa90d5b2eab3db692

    • SHA512

      80be3ec03b184134c41894df5e54c5208884f1fdd589404f8dbf77c56fba7024186f9b67b5607bf1313d79831bddcaca1912fc14d5a205adfbabbc63bddec59b

    • SSDEEP

      196608:bf7KZOrr3vrLxxX8IxTHvzHamKvSMc0ub+93NFB0H9JtOYQzM9kfXlBlLseXzrR:iIff3xJ8IxvHYv7399Y0YQzH1LLVXHR

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks