General

  • Target

    3047d9198278f2c1c58176e892684a0e_JaffaCakes118

  • Size

    437KB

  • Sample

    241010-rhzzcazbkf

  • MD5

    3047d9198278f2c1c58176e892684a0e

  • SHA1

    67327d3727fa922452347f7ab8eb1f1e150793ab

  • SHA256

    a63891ed72d6b7742db95e32f6c251163913384ed46acfae0011e62128eec113

  • SHA512

    fd45020026625685e0f305b076a2dbc3e73fbdd1457d9cd7b706629c31c8f9b68e5e938b2c2ef656d1757941fe1181177bad9a59d6cefbc6bfe6b160e4c01560

  • SSDEEP

    12288:3x1Fn/+G7xBW/GUaPMQtX79xa/B9xQglKNG1tG4EmzD:3l/v7xEKPMY76Z9xQglKN4GAH

Malware Config

Targets

    • Target

      3047d9198278f2c1c58176e892684a0e_JaffaCakes118

    • Size

      437KB

    • MD5

      3047d9198278f2c1c58176e892684a0e

    • SHA1

      67327d3727fa922452347f7ab8eb1f1e150793ab

    • SHA256

      a63891ed72d6b7742db95e32f6c251163913384ed46acfae0011e62128eec113

    • SHA512

      fd45020026625685e0f305b076a2dbc3e73fbdd1457d9cd7b706629c31c8f9b68e5e938b2c2ef656d1757941fe1181177bad9a59d6cefbc6bfe6b160e4c01560

    • SSDEEP

      12288:3x1Fn/+G7xBW/GUaPMQtX79xa/B9xQglKNG1tG4EmzD:3l/v7xEKPMY76Z9xQglKN4GAH

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks