General

  • Target

    3c76275f27d83c1b3c5e83dd0bf3ff8a_JaffaCakes118

  • Size

    79.5MB

  • Sample

    240513-zbentsdc84

  • MD5

    3c76275f27d83c1b3c5e83dd0bf3ff8a

  • SHA1

    3d2c6927c8941de9027245d7bffd10cf4459fb2f

  • SHA256

    6f0bb57865034949176feef96fc7ac88fe2ab5e269039d82fa1f9e20f54b8432

  • SHA512

    6eda60721f6cd1c4b1ec7bda531ad12a845f8bbc9679b0b74bbd6a26f12d8f080f5cf183db1d896cdcd9a24bc406f26dbd70200153ee11d8671018affc3face3

  • SSDEEP

    1572864:DE4ceDeOsZ5D4woBUTcjmpPkLnffgj/S3VCoicBCweGXBQMNLU6JyiCR:rceyRZ6nB6+mpP+nHIK3V+7wHjN7ghR

Malware Config

Extracted

Family

joker

C2

http://androidsdk.ads.mp.mydas.mobi/getAd.php5?

http://i.w.inmobi.com/showad.asm

http://www.tumblr.com/connect/login_success.html

https://androidads23.adcolony.com/configure

https://d.appsdt.com/download/tracker/iatsdkconfs?

https://data.flurry.com/aap.do

https://proton.flurry.com/sdk/v1/config

Targets

    • Target

      3c76275f27d83c1b3c5e83dd0bf3ff8a_JaffaCakes118

    • Size

      79.5MB

    • MD5

      3c76275f27d83c1b3c5e83dd0bf3ff8a

    • SHA1

      3d2c6927c8941de9027245d7bffd10cf4459fb2f

    • SHA256

      6f0bb57865034949176feef96fc7ac88fe2ab5e269039d82fa1f9e20f54b8432

    • SHA512

      6eda60721f6cd1c4b1ec7bda531ad12a845f8bbc9679b0b74bbd6a26f12d8f080f5cf183db1d896cdcd9a24bc406f26dbd70200153ee11d8671018affc3face3

    • SSDEEP

      1572864:DE4ceDeOsZ5D4woBUTcjmpPkLnffgj/S3VCoicBCweGXBQMNLU6JyiCR:rceyRZ6nB6+mpP+nHIK3V+7wHjN7ghR

    Score
    7/10
    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

MITRE ATT&CK Mobile v15

Tasks