General

  • Target

    28a5802d195b31d0a3dc79f2c37462b0_JaffaCakes118

  • Size

    24.2MB

  • Sample

    240509-gwrvsadg8y

  • MD5

    28a5802d195b31d0a3dc79f2c37462b0

  • SHA1

    f43db0fbf919c1d83223c08ad1f5fe49cb7968a2

  • SHA256

    9c364b8328ac467d177a08078905bde64642037e761bd6afbaf89ee69805a910

  • SHA512

    28b7f6a12d30680264168e22827828edd5068d3c4ade3e75d4968f7aff08737ce3f66a7c94a106bb9b24b6ae94a7a09cc311da3c1dcce9e72283de984d09751f

  • SSDEEP

    393216:oiLO0fAXLUQMu+H4+CsCyXKW+aH1BAXOt7qqcIgzHlyFhiT3CngcPRYeuao26jmf:mYAXU5PCya01BCpaFh6CfWqo2W4D/

Malware Config

Targets

    • Target

      28a5802d195b31d0a3dc79f2c37462b0_JaffaCakes118

    • Size

      24.2MB

    • MD5

      28a5802d195b31d0a3dc79f2c37462b0

    • SHA1

      f43db0fbf919c1d83223c08ad1f5fe49cb7968a2

    • SHA256

      9c364b8328ac467d177a08078905bde64642037e761bd6afbaf89ee69805a910

    • SHA512

      28b7f6a12d30680264168e22827828edd5068d3c4ade3e75d4968f7aff08737ce3f66a7c94a106bb9b24b6ae94a7a09cc311da3c1dcce9e72283de984d09751f

    • SSDEEP

      393216:oiLO0fAXLUQMu+H4+CsCyXKW+aH1BAXOt7qqcIgzHlyFhiT3CngcPRYeuao26jmf:mYAXU5PCya01BCpaFh6CfWqo2W4D/

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Legitimate hosting services abused for malware hosting/C2

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      ksc_plugin_v407.apk

    • Size

      520KB

    • MD5

      b9246a2a3a7364ed91bc4e451356214d

    • SHA1

      6290cd9545ce9651fbd0f2001f58569f61df9d53

    • SHA256

      96b5885222f07891882b9da6ce76e6327841e2d222802cd0fb5fdd8e152342a6

    • SHA512

      8d227d9be5b3c8aabb009f075486b5396aec2cf04e16515e2e095941ea56c39839f8ea4297fc5c7223d5a0f608d4055c9d2a7b50d348d3dd474afb3b7551112a

    • SSDEEP

      12288:aMORrkd7rc6e7xOW3abGRMMyCXnVaGDC2ndbLhy0bhQS:aMORkd7g6eMOBJyMVjT3VqS

    Score
    1/10
    • Target

      mimo_asset.apk

    • Size

      300KB

    • MD5

      b3bc6255feea6cd9398fa0cc9da7a88d

    • SHA1

      85924ff9afd7531e191367a1c1c086829161fa19

    • SHA256

      8de83f61dbba332ba95cdeefea24114adc08f483b45398a53bf06f5608e4d65e

    • SHA512

      0020ec00005ac5127d9425dea6713980881d33b72c767c42d0237fad5cf403c751a6d8d153ce6b4286e227042b36c0909e2a7af55b635963193e6cc99e78a644

    • SSDEEP

      6144:9ZuHNuP4S37gQ3HSBSZGFbtxTPgVpqzjDPNHcPLwyU8wgKZ/sCtYte:ewPD73HyVL0VpqzjrhW35KdJYte

    Score
    1/10

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks