General

  • Target

    b7739e7e2e0bfb61bf9e8d4bdcfe25ee_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240617-jj8c4s1bkh

  • MD5

    b7739e7e2e0bfb61bf9e8d4bdcfe25ee

  • SHA1

    50d42a00b2a8368aaf7f307645b370d4e7b2f95f

  • SHA256

    3ee2a591639371471189a3bfdbaa944f6ca599026e850f27b3de78cfe6155cc7

  • SHA512

    03840857bc04f36c9da4ba5e510bbc142d622f61805142b6292db43db27cfbc96bd808066890e8813b57ede20d6579220caca223941a7a47fcdc075842cfa7bd

  • SSDEEP

    49152:sn0dL/vo/75vWXJBRZ3vXYYoAyEh0n+Jc9Sp4iRbVx+k6LUcLFopnWvP:s09Q/7QJD9PYO9AZPMVxEvP

Malware Config

Targets

    • Target

      b7739e7e2e0bfb61bf9e8d4bdcfe25ee_JaffaCakes118

    • Size

      3.3MB

    • MD5

      b7739e7e2e0bfb61bf9e8d4bdcfe25ee

    • SHA1

      50d42a00b2a8368aaf7f307645b370d4e7b2f95f

    • SHA256

      3ee2a591639371471189a3bfdbaa944f6ca599026e850f27b3de78cfe6155cc7

    • SHA512

      03840857bc04f36c9da4ba5e510bbc142d622f61805142b6292db43db27cfbc96bd808066890e8813b57ede20d6579220caca223941a7a47fcdc075842cfa7bd

    • SSDEEP

      49152:sn0dL/vo/75vWXJBRZ3vXYYoAyEh0n+Jc9Sp4iRbVx+k6LUcLFopnWvP:s09Q/7QJD9PYO9AZPMVxEvP

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks