General

  • Target

    f87c9e40f6a5a27e1333ab071dde36e8_JaffaCakes118

  • Size

    17.4MB

  • Sample

    240418-wkkpnaca5z

  • MD5

    f87c9e40f6a5a27e1333ab071dde36e8

  • SHA1

    09df5ce776681421294e6abee4a4ffc65549d42e

  • SHA256

    555ea72ad9ab38d078d3f65de3b8b2517d6781552484016003a982c9ead0f49d

  • SHA512

    6a9483b12564899e1ffb03c29f2cfd018277c1da7e30fdd9fd81082bf02ebf5f0639e943973fd8f51aaf2d8d76f37857ff24384edb4a8bf7605869af9062585c

  • SSDEEP

    393216:mbqKtHFnEccC3ADlbQoQP6t2zRCPs9V1YaJhVW:SX3jG9Qug4sv1rzVW

Malware Config

Targets

    • Target

      f87c9e40f6a5a27e1333ab071dde36e8_JaffaCakes118

    • Size

      17.4MB

    • MD5

      f87c9e40f6a5a27e1333ab071dde36e8

    • SHA1

      09df5ce776681421294e6abee4a4ffc65549d42e

    • SHA256

      555ea72ad9ab38d078d3f65de3b8b2517d6781552484016003a982c9ead0f49d

    • SHA512

      6a9483b12564899e1ffb03c29f2cfd018277c1da7e30fdd9fd81082bf02ebf5f0639e943973fd8f51aaf2d8d76f37857ff24384edb4a8bf7605869af9062585c

    • SSDEEP

      393216:mbqKtHFnEccC3ADlbQoQP6t2zRCPs9V1YaJhVW:SX3jG9Qug4sv1rzVW

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      vivounionapk_v4.2.0.0_130e63a_201805051638_signed_aligned.vua

    • Size

      4.1MB

    • MD5

      e4ddeaae4526ad8044a2e984ff9cabb7

    • SHA1

      b0abe8aa7c19fc53f346167c3fd7f0b9d87a12ec

    • SHA256

      b3a51e80dfcec0755cab740e62feed408cd22857f3c40c3cfd1a8f388c81cdf8

    • SHA512

      7826de6bf2a8cf5574a7a5d4c28c73ebfe085c301fd69ea14c3cef45ed5d5abce2c4b72068da598c0dd70b455bbbac912b010f2e6193985678ab7042f4a61a43

    • SSDEEP

      98304:lHQnWhVPImz73W9L04sdYKWIrrbEx6pxoSd:NQ0PImPkTtKI6jF

    Score
    7/10
    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      vivounionsdk.res

    • Size

      29KB

    • MD5

      7b5793075193f9691e52568c92a4e656

    • SHA1

      89c42af41f3b0976a25a82afc9d552872cb6bfa3

    • SHA256

      5e2f6b3cd8b63dc03745e125da74e1e18535af4701c6b7bdac7b59928e0dfd2e

    • SHA512

      ac473e0731ee33bf846a076a0839ba2445a71c8a7fced16ea1bdfac86da22240c30eb43fac7aa504778102aff32b1484768b5be27150403352da468262576384

    • SSDEEP

      384:BnhOkWj/YFCwHIAtYo87LSAZq41bXjDIcbjE/cmRLaBs92y:ux4omXAZqyjDIcvuc4GUh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks