General

  • Target

    b16c7105839661a54df694da8c1a630c_JaffaCakes118

  • Size

    216KB

  • Sample

    241129-qca8cs1phl

  • MD5

    b16c7105839661a54df694da8c1a630c

  • SHA1

    632305209530a7ee156c78019c593fda4d237d4a

  • SHA256

    f15c84ffa9218b9785794ce2db01fb05a0e4968767d9aa6af0d530970e1477e4

  • SHA512

    f75d49c06cb0221736b29ed355d86241b83cf5b9baea9495129906eff0562b923bfb74770ab1002c69dc2731b207593042e21f78eae997fad81afa9d22900f93

  • SSDEEP

    3072:AIlbZAam/xwWaMaPC5+kAMEJGoRLG2Yv/7pcmds+qTyGZ3E9WA:AiZAamZwWaMlfFo1NOcmdsF3qWA

Malware Config

Targets

    • Target

      b16c7105839661a54df694da8c1a630c_JaffaCakes118

    • Size

      216KB

    • MD5

      b16c7105839661a54df694da8c1a630c

    • SHA1

      632305209530a7ee156c78019c593fda4d237d4a

    • SHA256

      f15c84ffa9218b9785794ce2db01fb05a0e4968767d9aa6af0d530970e1477e4

    • SHA512

      f75d49c06cb0221736b29ed355d86241b83cf5b9baea9495129906eff0562b923bfb74770ab1002c69dc2731b207593042e21f78eae997fad81afa9d22900f93

    • SSDEEP

      3072:AIlbZAam/xwWaMaPC5+kAMEJGoRLG2Yv/7pcmds+qTyGZ3E9WA:AiZAamZwWaMlfFo1NOcmdsF3qWA

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks