General

  • Target

    f7337dd096685191614374d757b78e26_JaffaCakes118

  • Size

    13.3MB

  • Sample

    240418-edwpxabe3x

  • MD5

    f7337dd096685191614374d757b78e26

  • SHA1

    2faa70f38bfe5cd7efb2ea7be5720f18ff28b358

  • SHA256

    93e18fa7a1ef9a9c4c98b60e4b952bf84461d851cd4a957fc96bcb8e9bb7b632

  • SHA512

    4b85b7505a07f41a05f2a55af790c370f003380715702d394414bc19bfe3b9f84195e4f067b48c1b7308acbbf049e25f9768527cf594ec182a87bbb893e2e82a

  • SSDEEP

    196608:yDDLrEVi3G93yAHXvNC7bCAb6QFdLOsFcsy67ZeX5Qc29eeTU:vmG91/07OAFOwcsy0BcT

Malware Config

Targets

    • Target

      f7337dd096685191614374d757b78e26_JaffaCakes118

    • Size

      13.3MB

    • MD5

      f7337dd096685191614374d757b78e26

    • SHA1

      2faa70f38bfe5cd7efb2ea7be5720f18ff28b358

    • SHA256

      93e18fa7a1ef9a9c4c98b60e4b952bf84461d851cd4a957fc96bcb8e9bb7b632

    • SHA512

      4b85b7505a07f41a05f2a55af790c370f003380715702d394414bc19bfe3b9f84195e4f067b48c1b7308acbbf049e25f9768527cf594ec182a87bbb893e2e82a

    • SSDEEP

      196608:yDDLrEVi3G93yAHXvNC7bCAb6QFdLOsFcsy67ZeX5Qc29eeTU:vmG91/07OAFOwcsy0BcT

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks