General

  • Target

    8ac1ef343a0816c6a72cdc15c6c95893_JaffaCakes118

  • Size

    698KB

  • Sample

    241103-le5sja1bke

  • MD5

    8ac1ef343a0816c6a72cdc15c6c95893

  • SHA1

    a8d08172c7339feb8a0351d25b609cd0f43090a4

  • SHA256

    75ca85dedf1d9732d6f10d5005d9e326b5f7ba44e9a86f2d067c8651563f97a4

  • SHA512

    74619798d813ace0f5a15f7be3676825726fdc0fe1d1a6f324a0f1d0d7b98bf82e3144e6b5ab0d730ffcb4ff8587a53d49434994bbeae72003f5265ab9493fe0

  • SSDEEP

    12288:YEj4s1Iy/n/bI4NaC0oX/oNIx3eT2FQUIKyJU8SqVYFgyP+cmU9Gs2qJ/itgRpfT:YPcIy/n/bnaC0oXOT2FKSqWccn9oMitC

Malware Config

Targets

    • Target

      8ac1ef343a0816c6a72cdc15c6c95893_JaffaCakes118

    • Size

      698KB

    • MD5

      8ac1ef343a0816c6a72cdc15c6c95893

    • SHA1

      a8d08172c7339feb8a0351d25b609cd0f43090a4

    • SHA256

      75ca85dedf1d9732d6f10d5005d9e326b5f7ba44e9a86f2d067c8651563f97a4

    • SHA512

      74619798d813ace0f5a15f7be3676825726fdc0fe1d1a6f324a0f1d0d7b98bf82e3144e6b5ab0d730ffcb4ff8587a53d49434994bbeae72003f5265ab9493fe0

    • SSDEEP

      12288:YEj4s1Iy/n/bI4NaC0oX/oNIx3eT2FQUIKyJU8SqVYFgyP+cmU9Gs2qJ/itgRpfT:YPcIy/n/bnaC0oXOT2FKSqWccn9oMitC

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks