General

  • Target

    aed148869fdc4d5bf67d63bd0ae48253_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240615-rlsz7stbrd

  • MD5

    aed148869fdc4d5bf67d63bd0ae48253

  • SHA1

    92a222da4e8b15cd857915d5650fb08480fa55a2

  • SHA256

    245448e475ac5136413211296bf7409f0508ebe7d572547d7a2ac9f75a9391a4

  • SHA512

    b813927553882268fc247fae23a3c19c20e7686cfafed18deeeae563df465c3734e08a488ab444531e5d85b55097652c1c229ce09dc614cca480962500afaeac

  • SSDEEP

    98304:cickbgCnulbE0k28rfAwQUycfgL2AP4tl:cijbgCnu+0bMAJ12APk

Malware Config

Targets

    • Target

      aed148869fdc4d5bf67d63bd0ae48253_JaffaCakes118

    • Size

      3.8MB

    • MD5

      aed148869fdc4d5bf67d63bd0ae48253

    • SHA1

      92a222da4e8b15cd857915d5650fb08480fa55a2

    • SHA256

      245448e475ac5136413211296bf7409f0508ebe7d572547d7a2ac9f75a9391a4

    • SHA512

      b813927553882268fc247fae23a3c19c20e7686cfafed18deeeae563df465c3734e08a488ab444531e5d85b55097652c1c229ce09dc614cca480962500afaeac

    • SSDEEP

      98304:cickbgCnulbE0k28rfAwQUycfgL2AP4tl:cijbgCnu+0bMAJ12APk

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks