General

  • Target

    4986f4095e36b48a77db5ec1a572cd70_JaffaCakes118

  • Size

    909KB

  • Sample

    241015-xtz2dawcpj

  • MD5

    4986f4095e36b48a77db5ec1a572cd70

  • SHA1

    7d40e910053fc2390bc9ee27b0067200d30f28ac

  • SHA256

    8c35f92fe4bf0dbc19d4a6209911940b5c8ed6f478472043e721fd78109d3a0c

  • SHA512

    4f132b6622e41cc2763511af221fab1116c8314c0e7eaa4d5863d662785a64f537cf7c5fc7875dd5107362d4bb879b0512ce900ec80527d3bdb85dbf66037dba

  • SSDEEP

    24576:4DvcycNkJjlJjnCJT1V4Oap87XOCdfTaOfUNnyBtnDxE:44wrzmwpYJDDBtDC

Malware Config

Targets

    • Target

      4986f4095e36b48a77db5ec1a572cd70_JaffaCakes118

    • Size

      909KB

    • MD5

      4986f4095e36b48a77db5ec1a572cd70

    • SHA1

      7d40e910053fc2390bc9ee27b0067200d30f28ac

    • SHA256

      8c35f92fe4bf0dbc19d4a6209911940b5c8ed6f478472043e721fd78109d3a0c

    • SHA512

      4f132b6622e41cc2763511af221fab1116c8314c0e7eaa4d5863d662785a64f537cf7c5fc7875dd5107362d4bb879b0512ce900ec80527d3bdb85dbf66037dba

    • SSDEEP

      24576:4DvcycNkJjlJjnCJT1V4Oap87XOCdfTaOfUNnyBtnDxE:44wrzmwpYJDDBtDC

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks