General

  • Target

    111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118

  • Size

    3.6MB

  • Sample

    241004-axr4lsyekd

  • MD5

    111c13be5f87e5da98cee5c9e7bb7c5f

  • SHA1

    04d85727953f45e923a46378108802f11169c334

  • SHA256

    4bbc485e0e2e7cce46124655042322b9a5f7e4f22725ba05cef2547584bcaade

  • SHA512

    8782aad0322d1020b4e4bb0683a98fe76745730dc71ca574cc1499fd81540fe8ca43f62b80f0cff59b9fa37fb52a778fbcc6da72d4ccc0d980ae03b956f0e372

  • SSDEEP

    49152:Ho0uOTcTcpGiB0ILUDKRXJBGpiyxszT8kjypq9gZd+IXhIheKc2Jg2Q9iPWc:Ho0Hki3LpxDGpiyxszT8c9gZc/9Jgl6L

Malware Config

Targets

    • Target

      111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118

    • Size

      3.6MB

    • MD5

      111c13be5f87e5da98cee5c9e7bb7c5f

    • SHA1

      04d85727953f45e923a46378108802f11169c334

    • SHA256

      4bbc485e0e2e7cce46124655042322b9a5f7e4f22725ba05cef2547584bcaade

    • SHA512

      8782aad0322d1020b4e4bb0683a98fe76745730dc71ca574cc1499fd81540fe8ca43f62b80f0cff59b9fa37fb52a778fbcc6da72d4ccc0d980ae03b956f0e372

    • SSDEEP

      49152:Ho0uOTcTcpGiB0ILUDKRXJBGpiyxszT8kjypq9gZd+IXhIheKc2Jg2Q9iPWc:Ho0Hki3LpxDGpiyxszT8c9gZc/9Jgl6L

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks