General

  • Target

    b741d2b6745db00def2922e779d2b0bf_JaffaCakes118

  • Size

    615KB

  • Sample

    240617-hjn4sssgrp

  • MD5

    b741d2b6745db00def2922e779d2b0bf

  • SHA1

    1298ed5ce8e48405a9a3c566c756d7344d9e305a

  • SHA256

    56d17dc249dabe1340986351f636daddd96eb649e0e05f30d265d4a33e9c9246

  • SHA512

    f482276cf8a369b1110773731726601056662680f68330ec991ab3b554d6efeac5208dc6d2edf91d323a80d1ed08ca0759e4599991fbc7f42753b70dcd71e9be

  • SSDEEP

    12288:9DrVLy7/yNALXxOUDs/Lp6uN38NDFTIKn1MQWnA+Rhffmdare:9DBLyqNALkbTh+5FTJ+REP

Malware Config

Targets

    • Target

      b741d2b6745db00def2922e779d2b0bf_JaffaCakes118

    • Size

      615KB

    • MD5

      b741d2b6745db00def2922e779d2b0bf

    • SHA1

      1298ed5ce8e48405a9a3c566c756d7344d9e305a

    • SHA256

      56d17dc249dabe1340986351f636daddd96eb649e0e05f30d265d4a33e9c9246

    • SHA512

      f482276cf8a369b1110773731726601056662680f68330ec991ab3b554d6efeac5208dc6d2edf91d323a80d1ed08ca0759e4599991fbc7f42753b70dcd71e9be

    • SSDEEP

      12288:9DrVLy7/yNALXxOUDs/Lp6uN38NDFTIKn1MQWnA+Rhffmdare:9DBLyqNALkbTh+5FTJ+REP

    • Removes its main activity from the application launcher

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks