General

  • Target

    84a49d46764cd7f1523c6839e373bea6_JaffaCakes118

  • Size

    4.9MB

  • Sample

    241101-2tr3zsxqhk

  • MD5

    84a49d46764cd7f1523c6839e373bea6

  • SHA1

    9d2cfb8c773f5067019c13aa4ff83bf03bd36e9e

  • SHA256

    86c398c92234fc6841212d92bb38fb8ada3a5adef07e458e0b639d79c6750ba0

  • SHA512

    543fd0be2f64a529e1b51e09c4259cb38a474884fb34c3055cb4d4f1b5695490160466ff10c27c834ecdfcdeb584d5823a24a0138b4e5f10d9e9204754a061f7

  • SSDEEP

    98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2te:28DuwhfNktuLhENtOomWc4

Malware Config

Targets

    • Target

      84a49d46764cd7f1523c6839e373bea6_JaffaCakes118

    • Size

      4.9MB

    • MD5

      84a49d46764cd7f1523c6839e373bea6

    • SHA1

      9d2cfb8c773f5067019c13aa4ff83bf03bd36e9e

    • SHA256

      86c398c92234fc6841212d92bb38fb8ada3a5adef07e458e0b639d79c6750ba0

    • SHA512

      543fd0be2f64a529e1b51e09c4259cb38a474884fb34c3055cb4d4f1b5695490160466ff10c27c834ecdfcdeb584d5823a24a0138b4e5f10d9e9204754a061f7

    • SSDEEP

      98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2te:28DuwhfNktuLhENtOomWc4

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks