General

  • Target

    c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240829-dlntla1bjg

  • MD5

    c81f9a49de343163bef53ea8c7a28ef0

  • SHA1

    85419fcbddc7afea447dbd96ba45628afa3c6c77

  • SHA256

    4a83f5f1f050288612346573a19d4f1bc9533e51a810dafe171f9d1968b1a6a9

  • SHA512

    519daf7dbe72bc7340b8484b3477e13f106aebbb589b92b8c0a823ca378b773c2c8698d7e25595e50ddfd598da4956ef29d321fa772cb2e9a702eed61d01ffa6

  • SSDEEP

    49152:mzZZzRL3FzfztVieUWsm1KZChcQ4AibbiouaNe:mPzRL3FTzcWR1Q2c+YbIak

Malware Config

Targets

    • Target

      c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118

    • Size

      1.9MB

    • MD5

      c81f9a49de343163bef53ea8c7a28ef0

    • SHA1

      85419fcbddc7afea447dbd96ba45628afa3c6c77

    • SHA256

      4a83f5f1f050288612346573a19d4f1bc9533e51a810dafe171f9d1968b1a6a9

    • SHA512

      519daf7dbe72bc7340b8484b3477e13f106aebbb589b92b8c0a823ca378b773c2c8698d7e25595e50ddfd598da4956ef29d321fa772cb2e9a702eed61d01ffa6

    • SSDEEP

      49152:mzZZzRL3FzfztVieUWsm1KZChcQ4AibbiouaNe:mPzRL3FTzcWR1Q2c+YbIak

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks