General

  • Target

    cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118

  • Size

    19.1MB

  • Sample

    240901-bpt4nswhqd

  • MD5

    cdf1695f91d1e1ef9479b7aefb6ee30d

  • SHA1

    54fb4b6536aa777a683baa6c7aa4109d723d1e9c

  • SHA256

    e94c67253747673b7c71e43d300d3a09a80ea9f1323f8d692ecd55af195a8742

  • SHA512

    0e35957cba3f07f223bac46774a6543e689c5183a0b241d072afa1092eaecdde11c060522dc7d60486909733b1bd09973aed9e9cde452096fd9e0b9f4b246f65

  • SSDEEP

    393216:gjaHFeJzZMHK9Jk9diiVCxH276Kh2jnAoninOY0z/AugJ6JpV1L:iu8ziH2wVEH27PhOnzY70z4u+yv1L

Malware Config

Targets

    • Target

      cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118

    • Size

      19.1MB

    • MD5

      cdf1695f91d1e1ef9479b7aefb6ee30d

    • SHA1

      54fb4b6536aa777a683baa6c7aa4109d723d1e9c

    • SHA256

      e94c67253747673b7c71e43d300d3a09a80ea9f1323f8d692ecd55af195a8742

    • SHA512

      0e35957cba3f07f223bac46774a6543e689c5183a0b241d072afa1092eaecdde11c060522dc7d60486909733b1bd09973aed9e9cde452096fd9e0b9f4b246f65

    • SSDEEP

      393216:gjaHFeJzZMHK9Jk9diiVCxH276Kh2jnAoninOY0z/AugJ6JpV1L:iu8ziH2wVEH27PhOnzY70z4u+yv1L

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks