General

  • Target

    8579a6229b51964c568154465017bd67_JaffaCakes118

  • Size

    10.2MB

  • Sample

    241102-pwcpvsxlal

  • MD5

    8579a6229b51964c568154465017bd67

  • SHA1

    a683ebb33ee5bd1e6672a6755e78d14ee9dc8451

  • SHA256

    6c667762e78283b4ecfd64d438169d27c9797661166b1a803dde74d5f3a1ab16

  • SHA512

    9a855736cb8cc04f45f2b01553e8235985ae6b41b5a143873f2f6fc16d261b580c3c2e56c511b5f8aa7e5dbcfa06a37f4a8933d76367e9ec30b99e8838ee4783

  • SSDEEP

    196608:Kq0pb2NUMrwgShwUYXGUxfB+vRsizK5e87m8M9gVsmcIzYMwlAmHK7m:Kqo5MrwgWA2+ujzK5e8uxXI8MwDq7m

Malware Config

Targets

    • Target

      8579a6229b51964c568154465017bd67_JaffaCakes118

    • Size

      10.2MB

    • MD5

      8579a6229b51964c568154465017bd67

    • SHA1

      a683ebb33ee5bd1e6672a6755e78d14ee9dc8451

    • SHA256

      6c667762e78283b4ecfd64d438169d27c9797661166b1a803dde74d5f3a1ab16

    • SHA512

      9a855736cb8cc04f45f2b01553e8235985ae6b41b5a143873f2f6fc16d261b580c3c2e56c511b5f8aa7e5dbcfa06a37f4a8933d76367e9ec30b99e8838ee4783

    • SSDEEP

      196608:Kq0pb2NUMrwgShwUYXGUxfB+vRsizK5e87m8M9gVsmcIzYMwlAmHK7m:Kqo5MrwgWA2+ujzK5e8uxXI8MwDq7m

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks