General

  • Target

    371c7781149af54fa0d11827a16df03e_JaffaCakes118

  • Size

    206KB

  • Sample

    241011-2b7eysxdlb

  • MD5

    371c7781149af54fa0d11827a16df03e

  • SHA1

    9e4a6cef3c24f36b6dea36813233fa54ef4a1987

  • SHA256

    ee30c94fe7ad0ca6f7a942f887306ee0d4826711ccb4d2745ef1ebff42160413

  • SHA512

    c9487d56a8c630e57caaec6fd3ff31a3d4f6bf1b41127fb98d5f77b24d63bc049555964d23b9900cdabd3ffd62a4c036c9ae3df1cee1a7401137f94edaee3a51

  • SSDEEP

    3072:zorKJehlrcTfOEKhDrczYpKNyiINOYIdBWNmIkGvwGRs3K+8P1kJoF7GJ3m:z38gSBtrczYpcGLIjc1KGRkZ86oV6W

Malware Config

Targets

    • Target

      371c7781149af54fa0d11827a16df03e_JaffaCakes118

    • Size

      206KB

    • MD5

      371c7781149af54fa0d11827a16df03e

    • SHA1

      9e4a6cef3c24f36b6dea36813233fa54ef4a1987

    • SHA256

      ee30c94fe7ad0ca6f7a942f887306ee0d4826711ccb4d2745ef1ebff42160413

    • SHA512

      c9487d56a8c630e57caaec6fd3ff31a3d4f6bf1b41127fb98d5f77b24d63bc049555964d23b9900cdabd3ffd62a4c036c9ae3df1cee1a7401137f94edaee3a51

    • SSDEEP

      3072:zorKJehlrcTfOEKhDrczYpKNyiINOYIdBWNmIkGvwGRs3K+8P1kJoF7GJ3m:z38gSBtrczYpcGLIjc1KGRkZ86oV6W

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks