General

  • Target

    b8479c4a9f8b5b0830b2e2433bcfc23b_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240617-m661casajm

  • MD5

    b8479c4a9f8b5b0830b2e2433bcfc23b

  • SHA1

    6d39e593605685ccc8912fc1f0202659990dfe7f

  • SHA256

    d643a06a1dd2adf84871bacedba73e402f51103ba0449e8719d87279acd35255

  • SHA512

    5d8ad6592684184f0b1ea12af7f620cdc9373e39d19e379cec0a9b565d30f93d15652460b9e97c2b54d8d3ce62353be440a6d0e75029993826043a2f5827e81b

  • SSDEEP

    98304:MNJlhC+O2conkkL2SItFyep284PTSfRLroPmjA61sEwR05mT/dUv4BkchLG:MC+Of4pOFyep284+Qmj1GE6/d0W6

Malware Config

Targets

    • Target

      b8479c4a9f8b5b0830b2e2433bcfc23b_JaffaCakes118

    • Size

      4.6MB

    • MD5

      b8479c4a9f8b5b0830b2e2433bcfc23b

    • SHA1

      6d39e593605685ccc8912fc1f0202659990dfe7f

    • SHA256

      d643a06a1dd2adf84871bacedba73e402f51103ba0449e8719d87279acd35255

    • SHA512

      5d8ad6592684184f0b1ea12af7f620cdc9373e39d19e379cec0a9b565d30f93d15652460b9e97c2b54d8d3ce62353be440a6d0e75029993826043a2f5827e81b

    • SSDEEP

      98304:MNJlhC+O2conkkL2SItFyep284PTSfRLroPmjA61sEwR05mT/dUv4BkchLG:MC+Of4pOFyep284+Qmj1GE6/d0W6

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks