General

  • Target

    0585eb4661b3cd5e8cd8558bdafa5551_JaffaCakes118

  • Size

    18.2MB

  • Sample

    240428-s4cllsbc5x

  • MD5

    0585eb4661b3cd5e8cd8558bdafa5551

  • SHA1

    038de821772f40e07c689e9715ec3eca2b3595b4

  • SHA256

    1a5e3d80b1bbe0d7d4dedf1b94e6f1c9a708e1b7b6b94697b8f89539633fd331

  • SHA512

    f20dad91a65fd1ec471790aebe585d0da555609ac418014fdf58b5bc5affe6cd8f2299aea65a506b922a1c6523720eaf926ed5356554856dae16b3f1713303ac

  • SSDEEP

    393216:Gm2s3Ps7ePOTKpAqCbqyGzrdYk+AuXk3G/JXd9cAvfP/:GhsfsHbqCbqZzeBXiGFdCqfX

Malware Config

Targets

    • Target

      0585eb4661b3cd5e8cd8558bdafa5551_JaffaCakes118

    • Size

      18.2MB

    • MD5

      0585eb4661b3cd5e8cd8558bdafa5551

    • SHA1

      038de821772f40e07c689e9715ec3eca2b3595b4

    • SHA256

      1a5e3d80b1bbe0d7d4dedf1b94e6f1c9a708e1b7b6b94697b8f89539633fd331

    • SHA512

      f20dad91a65fd1ec471790aebe585d0da555609ac418014fdf58b5bc5affe6cd8f2299aea65a506b922a1c6523720eaf926ed5356554856dae16b3f1713303ac

    • SSDEEP

      393216:Gm2s3Ps7ePOTKpAqCbqyGzrdYk+AuXk3G/JXd9cAvfP/:GhsfsHbqCbqZzeBXiGFdCqfX

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Checks the presence of a debugger

    • Target

      seckeysdk.apk

    • Size

      18KB

    • MD5

      22952555cbeadbcbec9809b36850f964

    • SHA1

      7fefea81d1b9c46c47d87ce48d0d4279fdf00d32

    • SHA256

      b69ad1cfcb7ec506876ffb504bff9d8235600019d003600c53ec4e6643d33c81

    • SHA512

      61ad7b328fdd9b96f11186cc4a1b41e69f1398885e177ecc61e2d47bf613e5f0adb886c5f57107305dfb27650b8fa1dc22dfa52d366341889b2f3bc525f55fad

    • SSDEEP

      384:6DPvZgk1tGXvmr/Q7gcum8uPt2VXLRzHNZcLDER2NU3Y4MHIqz8j43:6D3WyGXvmro7g/vKYVXLRzf6DGqEOp

    Score
    1/10
    • Target

      vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.vua

    • Size

      4.2MB

    • MD5

      3200674229ed57cf762fc3d8c5137b55

    • SHA1

      0896d5f138545dc9ddbf0003518880d745c8fe0e

    • SHA256

      333ee74803ab4b114d6217250623869c751a00f4748c826c19ffcd7b29476195

    • SHA512

      31c96314a2b0d80ef3d6c04c0a6894b6a8ebff7e501fd48499ea0e12969ba4ac00cdd844caf839a16cdcffa5b51ee2f33af36a578dfd450c79c7e2bbc0c521ff

    • SSDEEP

      98304:aQn4W5hESDzkY18DTTcDPPIKGPBhFI+sqFkSOO:aQ4W5hEIkg8DTTcDPPIK+HFknO

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      vivounionsdk.res

    • Size

      29KB

    • MD5

      7a92466708fa1ae45c5585a5b986f5aa

    • SHA1

      e9e8e0dc60208b7a8b64a65550442a73f1166c30

    • SHA256

      cc8416f87003538f2c8ea5280a7eaebfb40597b6ebdcc33c4fa64b0cf08d3b73

    • SHA512

      026dec17ed60d89257c8cb7873a0ccc0de910aad6706f1bbb7936229d7074b9542b7b80a2040f466c64e6cf8896e8531ee01ed7acbfa6a7ed90637a5fe2d477d

    • SSDEEP

      384:RAhiLwh2JKStCYi7PSSDq41bVjDIcRy3ftLYHiLaBsKFj+C:RAV2wYnSDqojDIcsfiHiG3l

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks