General

  • Target

    ade90867708b001d1c0e97b49f81062c_JaffaCakes118

  • Size

    17.8MB

  • Sample

    240615-l4qd5szfkk

  • MD5

    ade90867708b001d1c0e97b49f81062c

  • SHA1

    c6b1cd8f6c980e69f050206635006cd9ee900315

  • SHA256

    65fdae982d5a381671cdf7822d3459c5b07f8f25381c8ab4db8df111472306d8

  • SHA512

    97de87c0690855b105eca6aee35682a2c1c964db4fa513ad778618b5c55d2fd48f54c08fad5864cae0bbaee8f29c6577841bddc23242eadfd9098cc343e0138c

  • SSDEEP

    196608:MDJk3So+kJP3uPjBk7cCeFgjF+S5cZU5OHPvTmN97QdI99Ryq/aLz:MD63CNdTFWISC7PSN97QdILwqyLz

Malware Config

Targets

    • Target

      ade90867708b001d1c0e97b49f81062c_JaffaCakes118

    • Size

      17.8MB

    • MD5

      ade90867708b001d1c0e97b49f81062c

    • SHA1

      c6b1cd8f6c980e69f050206635006cd9ee900315

    • SHA256

      65fdae982d5a381671cdf7822d3459c5b07f8f25381c8ab4db8df111472306d8

    • SHA512

      97de87c0690855b105eca6aee35682a2c1c964db4fa513ad778618b5c55d2fd48f54c08fad5864cae0bbaee8f29c6577841bddc23242eadfd9098cc343e0138c

    • SSDEEP

      196608:MDJk3So+kJP3uPjBk7cCeFgjF+S5cZU5OHPvTmN97QdI99Ryq/aLz:MD63CNdTFWISC7PSN97QdILwqyLz

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks