General

  • Target

    9ea42f4d81a9e756cb98b66b8e81c9f0_JaffaCakes118

  • Size

    2.8MB

  • Sample

    241125-3xsz5asqh1

  • MD5

    9ea42f4d81a9e756cb98b66b8e81c9f0

  • SHA1

    6de552ccf09b14d6351804e7894aa6f5abda95ae

  • SHA256

    83586b8bd71b8a067993755ccfbf90d961c273fd36994bf3af54f62d4cc98c8b

  • SHA512

    f34ac52d8c120c4353705e9a540b5771f55c1ba44f0b02391f4af63539ae6a1ac829c22061006c8c55ce7b8e41d52b271780d0141df2da1a62db387b3ed74df7

  • SSDEEP

    49152:npsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZlE:npMtAZmEPGD7xl1cqhXF6AKv33rAQNQn

Malware Config

Targets

    • Target

      9ea42f4d81a9e756cb98b66b8e81c9f0_JaffaCakes118

    • Size

      2.8MB

    • MD5

      9ea42f4d81a9e756cb98b66b8e81c9f0

    • SHA1

      6de552ccf09b14d6351804e7894aa6f5abda95ae

    • SHA256

      83586b8bd71b8a067993755ccfbf90d961c273fd36994bf3af54f62d4cc98c8b

    • SHA512

      f34ac52d8c120c4353705e9a540b5771f55c1ba44f0b02391f4af63539ae6a1ac829c22061006c8c55ce7b8e41d52b271780d0141df2da1a62db387b3ed74df7

    • SSDEEP

      49152:npsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZlE:npMtAZmEPGD7xl1cqhXF6AKv33rAQNQn

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks