General

  • Target

    b3ae7ccaafecd53677ebb87b48713fd0_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240821-qy6lds1end

  • MD5

    b3ae7ccaafecd53677ebb87b48713fd0

  • SHA1

    be2b4e6779e5d3f66e44bc3df08aa423afc85552

  • SHA256

    505b5994b4ce11b73d844709e4cca8e701597b44c944c7edd22f5587fc6c611c

  • SHA512

    4c473ca2747e9a903fef5e327b6473c01594178e1e66f43b213d5a3b28b47c2e07d999aaff653cdfeb79aa2be09d96af5c4d567bd5f2461e02786aa510abb2d9

  • SSDEEP

    49152:TTza2eSWSqV68YfFgI4ugi5ctGY8p59F0QYEwKVRKVSKVc73Zmg7:TTzfIM8GZ4uhYe9F1N/GrS

Malware Config

Targets

    • Target

      b3ae7ccaafecd53677ebb87b48713fd0_JaffaCakes118

    • Size

      2.0MB

    • MD5

      b3ae7ccaafecd53677ebb87b48713fd0

    • SHA1

      be2b4e6779e5d3f66e44bc3df08aa423afc85552

    • SHA256

      505b5994b4ce11b73d844709e4cca8e701597b44c944c7edd22f5587fc6c611c

    • SHA512

      4c473ca2747e9a903fef5e327b6473c01594178e1e66f43b213d5a3b28b47c2e07d999aaff653cdfeb79aa2be09d96af5c4d567bd5f2461e02786aa510abb2d9

    • SSDEEP

      49152:TTza2eSWSqV68YfFgI4ugi5ctGY8p59F0QYEwKVRKVSKVc73Zmg7:TTzfIM8GZ4uhYe9F1N/GrS

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks