General

  • Target

    31355555f9ca90db277f2d399917a847_JaffaCakes118

  • Size

    791KB

  • Sample

    241010-wkfqpsyemf

  • MD5

    31355555f9ca90db277f2d399917a847

  • SHA1

    a8dfdaf3a19105934e5b56708033a1e97f436af0

  • SHA256

    4b77b8dd46288fcb83a99ed57bb23cfd84aa5cd7a7df362e97b0d56e61dbe248

  • SHA512

    9a43384cf7de41baba3680bf57b5e12b4b901723b0a4e1d5f2e152cf6475e6cf30671ed63a3b18d1bdcf6d7428f3579be4b2903ee21d8693df53139c177c683e

  • SSDEEP

    12288:AcmTJMKq86FgT097Ik4iRqmoyw5nde+eAYCWvEXQ6HXnCSAj6EVa6sq9oqScj4d6:nuJMKiO0Zsya4SNQA1Ah8T5cEcDfSc

Malware Config

Targets

    • Target

      31355555f9ca90db277f2d399917a847_JaffaCakes118

    • Size

      791KB

    • MD5

      31355555f9ca90db277f2d399917a847

    • SHA1

      a8dfdaf3a19105934e5b56708033a1e97f436af0

    • SHA256

      4b77b8dd46288fcb83a99ed57bb23cfd84aa5cd7a7df362e97b0d56e61dbe248

    • SHA512

      9a43384cf7de41baba3680bf57b5e12b4b901723b0a4e1d5f2e152cf6475e6cf30671ed63a3b18d1bdcf6d7428f3579be4b2903ee21d8693df53139c177c683e

    • SSDEEP

      12288:AcmTJMKq86FgT097Ik4iRqmoyw5nde+eAYCWvEXQ6HXnCSAj6EVa6sq9oqScj4d6:nuJMKiO0Zsya4SNQA1Ah8T5cEcDfSc

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks