General

  • Target

    3f2d4bd58619a92e0aeee927a69459ac_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240513-m7mm4abe9v

  • MD5

    3f2d4bd58619a92e0aeee927a69459ac

  • SHA1

    566d0e601a64d513dab6d1ea21bc2e5b1e5ff7b8

  • SHA256

    8cd95df60d08fa6fd80b7a0cdbc1e8e2f8826207d3dcf2a080396b280aa0ea6e

  • SHA512

    43d38e9740397a045d03358a86b44a8efc8523fc6ebfda855b1f9b1351f442b8620dd3525c482d49ec3ff35edb3e01f3ba30ea76aad5a7bc00ca48999aa5991f

  • SSDEEP

    196608:OyVwbi5uyxfwkIHwCuexrp3BEptUYUj0lV/uGMQfA9x9V7aXxOMFOSzrKE6:OowWfxfwkIQEBktUjwV/sUGx9V/MFxzS

Malware Config

Targets

    • Target

      3f2d4bd58619a92e0aeee927a69459ac_JaffaCakes118

    • Size

      11.6MB

    • MD5

      3f2d4bd58619a92e0aeee927a69459ac

    • SHA1

      566d0e601a64d513dab6d1ea21bc2e5b1e5ff7b8

    • SHA256

      8cd95df60d08fa6fd80b7a0cdbc1e8e2f8826207d3dcf2a080396b280aa0ea6e

    • SHA512

      43d38e9740397a045d03358a86b44a8efc8523fc6ebfda855b1f9b1351f442b8620dd3525c482d49ec3ff35edb3e01f3ba30ea76aad5a7bc00ca48999aa5991f

    • SSDEEP

      196608:OyVwbi5uyxfwkIHwCuexrp3BEptUYUj0lV/uGMQfA9x9V7aXxOMFOSzrKE6:OowWfxfwkIQEBktUjwV/sUGx9V/MFxzS

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Makes a phone call.

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      bdxadsdk.jar

    • Size

      266KB

    • MD5

      170ce354f12852de7852a2cd8bfd6826

    • SHA1

      6068e357aa412ab67c263f20ebfcecfa55a27151

    • SHA256

      65a60000cbfd0dd36eefae21eb736eb3bb27c3acc7f0e87368896e6d9a756322

    • SHA512

      b04399dc7b7edfba26c3d055c434a221910d9916b3caca8d1768a8ffdcef2f6ddaf4e28187f23528a9209cac133586c050806de36848b3f7345434a088155835

    • SSDEEP

      6144:Ld666666666Pm7mJpNzlVtztmWlCshtenRJdzhiOZCFYcgGGcRnaNjjUiS:B666666666Pm7EzlVJtnl5EnRJiOZ/Gl

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      566KB

    • MD5

      51e4adbc1c24d52ef03d65f7c52ece1e

    • SHA1

      b80fb7ba62d9737929cdf5f3dd6edf0c9c23caa2

    • SHA256

      15b92d10a42d907b477382cf48cf8a6d3d3a68582dc6be1f4ee0890cd341672b

    • SHA512

      0dc0b41cfad5517dc947505e39ace8c0466a0581d58d04d0b61077e6505367ebbdd1b4fa05dc49e00bf612073b492589601013924f4a1253db933d72fa2bcd8a

    • SSDEEP

      12288:LdK2khPEBrvJ+ik/0MdToaI0IiY0EuVJXit45JypKe3S:BvoEtvJ+Hnpo10STS+45A53S

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks