Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    fd921f51fc6c528da02dc8dd02d16336_JaffaCakes118

  • Size

    8.3MB

  • Sample

    240420-y6d54shf2v

  • MD5

    fd921f51fc6c528da02dc8dd02d16336

  • SHA1

    9d6c6549086fa7fd74cf1973293b75229298b40b

  • SHA256

    3cbdfd9dc638f69c49792dbdb91632be06f9169b34a42d9d8fcd44f8aab1f660

  • SHA512

    d4d16b6d71a6d7f706aa1fe0bb790921bb550bddd18e2e6cc38d6d0e08c276a58df045874974a91a1eb029ed9d24100daaf125292100c487fcc64fdee11d51e0

  • SSDEEP

    196608:fJS0fjI4fjefjOfjufjkcKa7koXrrOlWUz:fFf04f6fifKfHyz

Malware Config

Targets

    • Target

      fd921f51fc6c528da02dc8dd02d16336_JaffaCakes118

    • Size

      8.3MB

    • MD5

      fd921f51fc6c528da02dc8dd02d16336

    • SHA1

      9d6c6549086fa7fd74cf1973293b75229298b40b

    • SHA256

      3cbdfd9dc638f69c49792dbdb91632be06f9169b34a42d9d8fcd44f8aab1f660

    • SHA512

      d4d16b6d71a6d7f706aa1fe0bb790921bb550bddd18e2e6cc38d6d0e08c276a58df045874974a91a1eb029ed9d24100daaf125292100c487fcc64fdee11d51e0

    • SSDEEP

      196608:fJS0fjI4fjefjOfjufjkcKa7koXrrOlWUz:fFf04f6fifKfHyz

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      UPPayPluginEx.apk

    • Size

      534KB

    • MD5

      52d2a48486c5cea1645ef650f3f72475

    • SHA1

      c35c315cf5b3e5300bd2682ec28b98b85b1c738a

    • SHA256

      7a06dcb3d7bdd583086feab7469d588c23ddc7631819de3881c0f3f5614e47c6

    • SHA512

      b06ffeac2bc7527375a4ffd7b0574c47ee7512cfc4bb480b71c0248706c3ccc049d634b78c7ca3b3760fb78138f950eaeffaa72e3c2b769957aef13cb99aee09

    • SSDEEP

      12288:HjEfQf5pyq98OsUp9NJsdrdShdp7HerCi/4o5LbPRg:Dxhpd8ijwpShdJe3ZK

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks