General

  • Target

    9ebadd106676345cc46cc4ab2aee3702_JaffaCakes118

  • Size

    3.9MB

  • Sample

    241126-ajcf1azrek

  • MD5

    9ebadd106676345cc46cc4ab2aee3702

  • SHA1

    d3c1178cdf1e11f34da5eab5ea6a45ee14e53334

  • SHA256

    f173060546cd13eb661c67805c3eecb2bcaec0cea5fb9985de4f2ae11294aec2

  • SHA512

    14156c0f69757f4b5d4c754afdaa70f1dafa065f65d3f911aeb6dabe41aeeab87027b62dae44163c70877b7f6c9ef39241b3d03bfeac65ce88e330b91a3fd535

  • SSDEEP

    98304:Sw4CGLLdlx+rNOCnBeh/rvUoyWZwCtCf60/H7+xk:m8ZdBUv1Z1t+60v7wk

Malware Config

Targets

    • Target

      9ebadd106676345cc46cc4ab2aee3702_JaffaCakes118

    • Size

      3.9MB

    • MD5

      9ebadd106676345cc46cc4ab2aee3702

    • SHA1

      d3c1178cdf1e11f34da5eab5ea6a45ee14e53334

    • SHA256

      f173060546cd13eb661c67805c3eecb2bcaec0cea5fb9985de4f2ae11294aec2

    • SHA512

      14156c0f69757f4b5d4c754afdaa70f1dafa065f65d3f911aeb6dabe41aeeab87027b62dae44163c70877b7f6c9ef39241b3d03bfeac65ce88e330b91a3fd535

    • SSDEEP

      98304:Sw4CGLLdlx+rNOCnBeh/rvUoyWZwCtCf60/H7+xk:m8ZdBUv1Z1t+60v7wk

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks