General

  • Target

    d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118

  • Size

    3.0MB

  • Sample

    240908-vd57caxaqj

  • MD5

    d4d4caa2afbcb1201db744cb8895fc84

  • SHA1

    754cef10c46568d3821ebbbcd67e78309e226a3e

  • SHA256

    9877e775dd2a9c36618a99c28a5f7533baf013591f83098d960b44f8c9abc817

  • SHA512

    eeee05f4cf2636e43ceb86b2f06360b87c4ce4bde696054404f48258bc55f83622ab281017624055ba6430a8831c1dd6254d83b83c50c5aaed52b2b5901d6443

  • SSDEEP

    49152:C3gyk6gV3GZOM2IaS8xb0e7qtDXFeF3x6/pQLXlObl15kiA9a/OEy5FRjWU:CwyVgtzM2Ide7ODXFY3xQ6Eas/QRjb

Malware Config

Targets

    • Target

      d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118

    • Size

      3.0MB

    • MD5

      d4d4caa2afbcb1201db744cb8895fc84

    • SHA1

      754cef10c46568d3821ebbbcd67e78309e226a3e

    • SHA256

      9877e775dd2a9c36618a99c28a5f7533baf013591f83098d960b44f8c9abc817

    • SHA512

      eeee05f4cf2636e43ceb86b2f06360b87c4ce4bde696054404f48258bc55f83622ab281017624055ba6430a8831c1dd6254d83b83c50c5aaed52b2b5901d6443

    • SSDEEP

      49152:C3gyk6gV3GZOM2IaS8xb0e7qtDXFeF3x6/pQLXlObl15kiA9a/OEy5FRjWU:CwyVgtzM2Ide7ODXFY3xQ6Eas/QRjb

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks