General

  • Target

    b0e24c98721c10c177093a840c6be95f_JaffaCakes118

  • Size

    4.9MB

  • Sample

    241129-nee8zssmc1

  • MD5

    b0e24c98721c10c177093a840c6be95f

  • SHA1

    6548e53ad2b7f14d02416481848f13712945646c

  • SHA256

    b6be844fb3ddc0d34557726ae2296b53ed29ceb11363b27d8dcb1cfbbd66cab6

  • SHA512

    d5d72b994dab684f786f1a13a52372a1a7ad94758824a1822bf0689c65bbdc38bd003d46da1142401a805f0ceedf4e134523a6d2fa6bbe859303ffac146b596b

  • SSDEEP

    98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2lG:28DuwhfNktuLhENtOomWc4

Malware Config

Targets

    • Target

      b0e24c98721c10c177093a840c6be95f_JaffaCakes118

    • Size

      4.9MB

    • MD5

      b0e24c98721c10c177093a840c6be95f

    • SHA1

      6548e53ad2b7f14d02416481848f13712945646c

    • SHA256

      b6be844fb3ddc0d34557726ae2296b53ed29ceb11363b27d8dcb1cfbbd66cab6

    • SHA512

      d5d72b994dab684f786f1a13a52372a1a7ad94758824a1822bf0689c65bbdc38bd003d46da1142401a805f0ceedf4e134523a6d2fa6bbe859303ffac146b596b

    • SSDEEP

      98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2lG:28DuwhfNktuLhENtOomWc4

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks