General

  • Target

    243b7099a52c48c730c5f8673dc11bc7_JaffaCakes118

  • Size

    4.7MB

  • Sample

    240508-lh5xpsdh6t

  • MD5

    243b7099a52c48c730c5f8673dc11bc7

  • SHA1

    bae66804729268b21071386693dd545db3ddabcc

  • SHA256

    0c65ffc15af6c7c8f98c7d35d34acf4c405a07ba49e46584de93f963d034cf1d

  • SHA512

    4f770c4fbb2fd4eacd249ed86d5a2df983bd8e02aac28a476ddfdd578f5828d2d918328fa83192615e84b0219f7584c76299692cb5a15c0821e4dcea5dbcc0ff

  • SSDEEP

    98304:Md7RKReXssAFjRCr9y2murgTgyaiCwUI8hCVK7RccMdrEXbu8:Hu+RYvzT5hQVK7RccY4LH

Malware Config

Targets

    • Target

      243b7099a52c48c730c5f8673dc11bc7_JaffaCakes118

    • Size

      4.7MB

    • MD5

      243b7099a52c48c730c5f8673dc11bc7

    • SHA1

      bae66804729268b21071386693dd545db3ddabcc

    • SHA256

      0c65ffc15af6c7c8f98c7d35d34acf4c405a07ba49e46584de93f963d034cf1d

    • SHA512

      4f770c4fbb2fd4eacd249ed86d5a2df983bd8e02aac28a476ddfdd578f5828d2d918328fa83192615e84b0219f7584c76299692cb5a15c0821e4dcea5dbcc0ff

    • SSDEEP

      98304:Md7RKReXssAFjRCr9y2murgTgyaiCwUI8hCVK7RccMdrEXbu8:Hu+RYvzT5hQVK7RccY4LH

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      plugin-deploy.jar

    • Size

      180KB

    • MD5

      73221f224e5d32e4f130dbe57ad395c0

    • SHA1

      1a8f63b73dede50dd56f469d0ee9bffa84eb9d63

    • SHA256

      8911616ac34f9c9508d25ad55183ab06dd05f1f80793d70fdf225cd56bf4ad55

    • SHA512

      58a1203866c0c376cfedfb493c21b8733f4796f6743414b810a63aa144b1af0acd9797d132684b8f255b9ebd76ba5405d0b5518c0c353c4a9b8839939a9c5c8a

    • SSDEEP

      3072:0axy6J5ZYUPRhL1ovWC/N7id4ZjkiKScsrqvqvdutOBkSZkujrFxqnAvGGNh:lg6+Q/L1ovrbjkZScsZvdHBhZjZExqh

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks