General

  • Target

    c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240826-d1hacssdpa

  • MD5

    c2315ea0e4fb893b62c2422c7f3e689d

  • SHA1

    de1c0a58bcd6a308d3c0367ffe6a2353b0796157

  • SHA256

    ab59dacca4c6ece8264a478495ddb51dcaa8a262cbd042a0d22d7b112cdf20ba

  • SHA512

    ffccc621dd65f8794b97b4023cf52ebe7c46d6709adc138c0009d79434a0642ade3d1a7147b5f8b10b49c2a7cd50beb98ba0f22ecb73be23639e0f0cd13ddf77

  • SSDEEP

    49152:ul0IRxYYX308GuRHyP4x5jyfZ2dqLG60/undmDVGTu4HjO:u9R+YnfVJe4HyfYkV0EmDmu4K

Malware Config

Targets

    • Target

      c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118

    • Size

      2.6MB

    • MD5

      c2315ea0e4fb893b62c2422c7f3e689d

    • SHA1

      de1c0a58bcd6a308d3c0367ffe6a2353b0796157

    • SHA256

      ab59dacca4c6ece8264a478495ddb51dcaa8a262cbd042a0d22d7b112cdf20ba

    • SHA512

      ffccc621dd65f8794b97b4023cf52ebe7c46d6709adc138c0009d79434a0642ade3d1a7147b5f8b10b49c2a7cd50beb98ba0f22ecb73be23639e0f0cd13ddf77

    • SSDEEP

      49152:ul0IRxYYX308GuRHyP4x5jyfZ2dqLG60/undmDVGTu4HjO:u9R+YnfVJe4HyfYkV0EmDmu4K

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks