General

  • Target

    0a9c0f4830002635d461e5e0503492b9_JaffaCakes118

  • Size

    7.6MB

  • Sample

    240430-213hasbg67

  • MD5

    0a9c0f4830002635d461e5e0503492b9

  • SHA1

    56b7eaac25098a832eebf014499654cff7b7d0ec

  • SHA256

    c6b068b14b42bd4685081edcccc063021d3045aa73637d4542febffdb5e3a103

  • SHA512

    7efdf5a434ff112c84eaf8d464cfd0f95e504a68635e10b3048b21af069733501fdf245e3ad26424ce603d95497f2ad84d6945ead7dd1aee03323461afa9d2f4

  • SSDEEP

    196608:7HTL+AycWArczCbnVuUZMvCQpLEXTTajf48USvTuvHa2SXUk6v:TeAy5ArczIbZELEGjfTlTH2SXj6v

Malware Config

Targets

    • Target

      0a9c0f4830002635d461e5e0503492b9_JaffaCakes118

    • Size

      7.6MB

    • MD5

      0a9c0f4830002635d461e5e0503492b9

    • SHA1

      56b7eaac25098a832eebf014499654cff7b7d0ec

    • SHA256

      c6b068b14b42bd4685081edcccc063021d3045aa73637d4542febffdb5e3a103

    • SHA512

      7efdf5a434ff112c84eaf8d464cfd0f95e504a68635e10b3048b21af069733501fdf245e3ad26424ce603d95497f2ad84d6945ead7dd1aee03323461afa9d2f4

    • SSDEEP

      196608:7HTL+AycWArczCbnVuUZMvCQpLEXTTajf48USvTuvHa2SXUk6v:TeAy5ArczIbZELEGjfTlTH2SXj6v

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Target

      ad_adview.jar

    • Size

      221KB

    • MD5

      ca8fb09bc237fe1355046786e66af7b6

    • SHA1

      b89da3367d6ca1c7e1f1aef22f7373fee72c66d4

    • SHA256

      dd3ee54c8158833c9639456d8286bcfc635be25c76ea739463fa07ddb237a46e

    • SHA512

      a595e96fe5d1426763af4e86852b0c7b4d710004317a8569b8d14f9c6b3c91a5e4ab94c89e363454714f3915036c7dfb4a5832201c1cf98990836ab12d005617

    • SSDEEP

      3072:3fiBEcKjLMbLldukEaAQ3B8yjxHABsAwyLVOsrY9xVcOzPR6EwZyRMhrHej9X/UT:PIsL6lvbAkRl3AwiMxVcOz55/09qjgV

    Score
    1/10
    • Target

      adbase.jar

    • Size

      112KB

    • MD5

      120fa34bbcbabdf144c2ccab45db5017

    • SHA1

      6f79a0de7e1398440cfcc37e10bb0088b7e8b5e2

    • SHA256

      65b910040ac1f627cd11b21507ae74daf449da456f3847ad80af29958c42be82

    • SHA512

      9e979a5d8609283ff6bc108c0e3c9ae033ede02b069b8147f759ae31d097f426f2c949d386a212c8669ba448081b6fe9ad79f1367fe407e206d6c4f5647875e4

    • SSDEEP

      1536:glFeC3ACHlSHDFbbjRirBYNdsi6pUOFxyI0EW0OaHGcuQOBkNrp5mR0sheg3:Gj3ACHIFEdoSi6pVDyB0RmcuQOBkxJzC

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      385KB

    • MD5

      824cb780ec81bb7366121b103e9820c0

    • SHA1

      149a0a58257fc4d67722c0a218d4a9119cd9304f

    • SHA256

      6d37ca4a40fcbcde1d8aaa1bba643e349614b8600166c50b03e397083725ce90

    • SHA512

      658b65bd1b7c044ce4d497378dbdde5915b9e1e57d4911d00df4d694326c15410be7bae556c6ebd335e8f68b619a333856b20213f624874cd0ea1eef0c26672b

    • SSDEEP

      6144:oHieHgKECmWW/O4TsEcyFTGl812C9xSzmkoEPn5iXQ9leg6Ob8ggUdJTtUsqpz:kiXbCBW5T7trBxPWA1Ob8sdJTUz

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks