General

  • Target

    b73878418ad3228d889b4101d340b4d3_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240617-hbgdzssepq

  • MD5

    b73878418ad3228d889b4101d340b4d3

  • SHA1

    9eab41ed0d1b2df676819c7b7b4c8332d842d6bf

  • SHA256

    ddb76a49223ea83a4db77140ec482f9c86bd28cdbc00292c5222d4bb1dcee4da

  • SHA512

    de351346c207137440e4b166155b6b69f1a687e5dc6428e58a33e26d45b0ff97aaa5ba9edf5e7ef6329498a1508d36fe1d0c907051d1a9f6f842ac60773d684d

  • SSDEEP

    98304:Y6WsYH/oRV32up5/z1mP8JkcrmrI3ky2J2Vfl530hKRzDqPzUzzi:Y6WsXf2S5/zf0IDa

Malware Config

Targets

    • Target

      b73878418ad3228d889b4101d340b4d3_JaffaCakes118

    • Size

      3.4MB

    • MD5

      b73878418ad3228d889b4101d340b4d3

    • SHA1

      9eab41ed0d1b2df676819c7b7b4c8332d842d6bf

    • SHA256

      ddb76a49223ea83a4db77140ec482f9c86bd28cdbc00292c5222d4bb1dcee4da

    • SHA512

      de351346c207137440e4b166155b6b69f1a687e5dc6428e58a33e26d45b0ff97aaa5ba9edf5e7ef6329498a1508d36fe1d0c907051d1a9f6f842ac60773d684d

    • SSDEEP

      98304:Y6WsYH/oRV32up5/z1mP8JkcrmrI3ky2J2Vfl530hKRzDqPzUzzi:Y6WsXf2S5/zf0IDa

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks