General

  • Target

    43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240713-134bya1gmd

  • MD5

    43892d15ea0cdc5eb1ee1027a916d01c

  • SHA1

    023722b7e8b34b11b011e73dbb07b125bc04280f

  • SHA256

    11324c38c687047a3811c1897b73cbd49a631619dc8e67c75c4b458f9356e2e5

  • SHA512

    5ba69f43adc1247cda4d9bf7710e2d01ae6f0879a4ea332d32f8f6d315756e87ac17eff8db590058c0099bd9c974fab3c4b2819d4a5d7b0e60fa2946074fb062

  • SSDEEP

    24576:1IdTO0zkthCkEO9Hj9XcHhHYYOcr06IMRpzPpkeERzjlQJ2XhWdATNU5tC:KXYjCkEO9HpXcHhHYZYQuPpdE7LhWOa2

Malware Config

Targets

    • Target

      43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118

    • Size

      1.4MB

    • MD5

      43892d15ea0cdc5eb1ee1027a916d01c

    • SHA1

      023722b7e8b34b11b011e73dbb07b125bc04280f

    • SHA256

      11324c38c687047a3811c1897b73cbd49a631619dc8e67c75c4b458f9356e2e5

    • SHA512

      5ba69f43adc1247cda4d9bf7710e2d01ae6f0879a4ea332d32f8f6d315756e87ac17eff8db590058c0099bd9c974fab3c4b2819d4a5d7b0e60fa2946074fb062

    • SSDEEP

      24576:1IdTO0zkthCkEO9Hj9XcHhHYYOcr06IMRpzPpkeERzjlQJ2XhWdATNU5tC:KXYjCkEO9HpXcHhHYZYQuPpdE7LhWOa2

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks