General

  • Target

    1e23a853a7d8694fd4d7d5b752a5f200_JaffaCakes118

  • Size

    276KB

  • Sample

    240702-f4v2qs1hpp

  • MD5

    1e23a853a7d8694fd4d7d5b752a5f200

  • SHA1

    b9fda9610f6b11616d7834a7f6a28447a603c8a2

  • SHA256

    f25766c3780d9b757a02e44678eec92aaa9e19f1b49980472ad3cd2a7fda87e6

  • SHA512

    243d555623ba5b4ccd3f4bd00450ed25adf7e5c2c14f79408112819e40bc4efae711fec9bbc2c9514452841cd5a93b356934a3933c144a08a61c47ff3675e954

  • SSDEEP

    6144:WiuKlMUzrxVBLc1YAlaXUI/igAdgzey7FDNaw4IzEsS/ZXBc2UA5fN4:duYMs7ucdigAdgRlNa/IvcRgE4

Malware Config

Targets

    • Target

      1e23a853a7d8694fd4d7d5b752a5f200_JaffaCakes118

    • Size

      276KB

    • MD5

      1e23a853a7d8694fd4d7d5b752a5f200

    • SHA1

      b9fda9610f6b11616d7834a7f6a28447a603c8a2

    • SHA256

      f25766c3780d9b757a02e44678eec92aaa9e19f1b49980472ad3cd2a7fda87e6

    • SHA512

      243d555623ba5b4ccd3f4bd00450ed25adf7e5c2c14f79408112819e40bc4efae711fec9bbc2c9514452841cd5a93b356934a3933c144a08a61c47ff3675e954

    • SSDEEP

      6144:WiuKlMUzrxVBLc1YAlaXUI/igAdgzey7FDNaw4IzEsS/ZXBc2UA5fN4:duYMs7ucdigAdgRlNa/IvcRgE4

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks