General

  • Target

    b787db0f1ee5a452cafc7be874c2c3c5_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240617-jxctcs1fnh

  • MD5

    b787db0f1ee5a452cafc7be874c2c3c5

  • SHA1

    59cfd80cabd76b29592a7896cdefd67c0a5d14c7

  • SHA256

    cb65afb970c23d570b7d48c36406325d8bf4483afd15ad2e2f60d5ef20656711

  • SHA512

    9ff5e78a1569d90c15ae5244548ee975a30e7487dde066d93d3701ec5ea23c439aa94165aeb162b677eccb130741e2cc7d3bf5d488ea69e46a127f934cabed2c

  • SSDEEP

    24576:uevy8iFZhyprdSTjqqXOkpSgDcUols5n3CCTn0t:uexiTIrdSSqXBown5T0t

Malware Config

Targets

    • Target

      b787db0f1ee5a452cafc7be874c2c3c5_JaffaCakes118

    • Size

      1.5MB

    • MD5

      b787db0f1ee5a452cafc7be874c2c3c5

    • SHA1

      59cfd80cabd76b29592a7896cdefd67c0a5d14c7

    • SHA256

      cb65afb970c23d570b7d48c36406325d8bf4483afd15ad2e2f60d5ef20656711

    • SHA512

      9ff5e78a1569d90c15ae5244548ee975a30e7487dde066d93d3701ec5ea23c439aa94165aeb162b677eccb130741e2cc7d3bf5d488ea69e46a127f934cabed2c

    • SSDEEP

      24576:uevy8iFZhyprdSTjqqXOkpSgDcUols5n3CCTn0t:uexiTIrdSSqXBown5T0t

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks