General

  • Target

    b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240822-nqndqsvcng

  • MD5

    b779eef1b41acc4dd3f6b44faaf717d2

  • SHA1

    74d24e0be677caa680186c890f560599570f7f3e

  • SHA256

    c06a648685eb9410a0e93ce91a45c670e1ed1f76145587d2f4d8d0d06bad0444

  • SHA512

    06c130d14edd95297428a63dd5c8604685feabbcff4e17e873e53ad5751be61167edc617577f8ea818d3aa7dfb8fb32dbdfacb75af69dfaebb8786de5b06cba5

  • SSDEEP

    98304:0nRtkdrTLh98dVVn9qGCHx+esMpGttj9tfGeiwEp3N+VPDNAMJBLj7Ap+oRe9PzR:0xVVnmxo3tjv3Ep3Nu5AqBLW+oI

Malware Config

Targets

    • Target

      b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118

    • Size

      5.9MB

    • MD5

      b779eef1b41acc4dd3f6b44faaf717d2

    • SHA1

      74d24e0be677caa680186c890f560599570f7f3e

    • SHA256

      c06a648685eb9410a0e93ce91a45c670e1ed1f76145587d2f4d8d0d06bad0444

    • SHA512

      06c130d14edd95297428a63dd5c8604685feabbcff4e17e873e53ad5751be61167edc617577f8ea818d3aa7dfb8fb32dbdfacb75af69dfaebb8786de5b06cba5

    • SSDEEP

      98304:0nRtkdrTLh98dVVn9qGCHx+esMpGttj9tfGeiwEp3N+VPDNAMJBLj7Ap+oRe9PzR:0xVVnmxo3tjv3Ep3Nu5AqBLW+oI

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks