General

  • Target

    7078042eab3a6342a934245e49a9d99b_JaffaCakes118

  • Size

    908KB

  • Sample

    241023-x7hz1sybpq

  • MD5

    7078042eab3a6342a934245e49a9d99b

  • SHA1

    bd5c302f35ee63694d28a28cc609a54cb406561b

  • SHA256

    0383375cbfa4767223b130c214d8c3ae10d0918fba8a3771ca43c1f69ee0c053

  • SHA512

    8dd820d81a9aba5eb20200a9ee4368350c3fa8fb578112a25b7c70a12502f87ab3eff8f6ed0836a9a402d461b98ca9154a4a1df2dc62b33ca6316acc929e1230

  • SSDEEP

    12288:6ALHbRk7h7jBC2kuGy9sNeVUyLVigOu113jnW32VtStEqX75OYsbs8S0hS6nxQOT:6ALKNjBDENcUrY3jW3L5OYduS62Ops8

Malware Config

Targets

    • Target

      7078042eab3a6342a934245e49a9d99b_JaffaCakes118

    • Size

      908KB

    • MD5

      7078042eab3a6342a934245e49a9d99b

    • SHA1

      bd5c302f35ee63694d28a28cc609a54cb406561b

    • SHA256

      0383375cbfa4767223b130c214d8c3ae10d0918fba8a3771ca43c1f69ee0c053

    • SHA512

      8dd820d81a9aba5eb20200a9ee4368350c3fa8fb578112a25b7c70a12502f87ab3eff8f6ed0836a9a402d461b98ca9154a4a1df2dc62b33ca6316acc929e1230

    • SSDEEP

      12288:6ALHbRk7h7jBC2kuGy9sNeVUyLVigOu113jnW32VtStEqX75OYsbs8S0hS6nxQOT:6ALKNjBDENcUrY3jW3L5OYduS62Ops8

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks