General

  • Target

    b7a79e295f23fb51105282797d05d8f7_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240617-kdyr6asepf

  • MD5

    b7a79e295f23fb51105282797d05d8f7

  • SHA1

    1de4a6a4395a45d6c1ec1c67cd27720ae9708034

  • SHA256

    3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

  • SHA512

    766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820

  • SSDEEP

    49152:iR9UR+nc3kqu1NhspkEqctCh+kv6m6yROX9jBczVbkge8axsRG/815LYgduVjdVV:iR9UR+n4kq0okh+M622atVaxswKYgsVB

Malware Config

Targets

    • Target

      b7a79e295f23fb51105282797d05d8f7_JaffaCakes118

    • Size

      2.9MB

    • MD5

      b7a79e295f23fb51105282797d05d8f7

    • SHA1

      1de4a6a4395a45d6c1ec1c67cd27720ae9708034

    • SHA256

      3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

    • SHA512

      766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820

    • SSDEEP

      49152:iR9UR+nc3kqu1NhspkEqctCh+kv6m6yROX9jBczVbkge8axsRG/815LYgduVjdVV:iR9UR+n4kq0okh+M622atVaxswKYgsVB

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks