General

  • Target

    5336892d2e67e465d6e2b0ed86235f7a_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240518-gbw9rsea61

  • MD5

    5336892d2e67e465d6e2b0ed86235f7a

  • SHA1

    984d8eaf1558adcaed53b42299c449e4bca59255

  • SHA256

    6b33edbb28801867d9eda5874c4b3231fff132b48ff0162616661ea752527d3b

  • SHA512

    e9ea95774d073248b2b1df7544ae529b64f622581b3a59a93dcb9234a114f314578a25e0f41d0464f6eb4f8dc0b92516bc352dcda129a94bf486560046860075

  • SSDEEP

    196608:GHQqVlCtDr+3y8krHOJy+Uvzjxi5hcitsMan7oz2W0Otufr1a/MdNV:fqKtHeyIIbRViM7pOtkr1sMjV

Malware Config

Targets

    • Target

      5336892d2e67e465d6e2b0ed86235f7a_JaffaCakes118

    • Size

      8.4MB

    • MD5

      5336892d2e67e465d6e2b0ed86235f7a

    • SHA1

      984d8eaf1558adcaed53b42299c449e4bca59255

    • SHA256

      6b33edbb28801867d9eda5874c4b3231fff132b48ff0162616661ea752527d3b

    • SHA512

      e9ea95774d073248b2b1df7544ae529b64f622581b3a59a93dcb9234a114f314578a25e0f41d0464f6eb4f8dc0b92516bc352dcda129a94bf486560046860075

    • SSDEEP

      196608:GHQqVlCtDr+3y8krHOJy+Uvzjxi5hcitsMan7oz2W0Otufr1a/MdNV:fqKtHeyIIbRViM7pOtkr1sMjV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      vivounionapk_v4.2.0.0_130e63a_201805051638_signed_aligned.vua

    • Size

      4.1MB

    • MD5

      e4ddeaae4526ad8044a2e984ff9cabb7

    • SHA1

      b0abe8aa7c19fc53f346167c3fd7f0b9d87a12ec

    • SHA256

      b3a51e80dfcec0755cab740e62feed408cd22857f3c40c3cfd1a8f388c81cdf8

    • SHA512

      7826de6bf2a8cf5574a7a5d4c28c73ebfe085c301fd69ea14c3cef45ed5d5abce2c4b72068da598c0dd70b455bbbac912b010f2e6193985678ab7042f4a61a43

    • SSDEEP

      98304:lHQnWhVPImz73W9L04sdYKWIrrbEx6pxoSd:NQ0PImPkTtKI6jF

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      wifipush_internal.dwt

    • Size

      72KB

    • MD5

      e53c5544b2d7506de055ed40de57315d

    • SHA1

      8c45794fe9fb6f4c3eac98c574cd6d2451dd37eb

    • SHA256

      a848fed5925035dc4c2f2fc1e6dd2633e347d6b1adda788c0a5b40bbffd1778b

    • SHA512

      15b0f4d6d408c2b52f951b5079a839ae21c93362b8b655a6b07a9be6097f1c1ee51979ac9fafd531a8987c777cf5902321a499281e5b91b4dea701d52dca63f0

    • SSDEEP

      1536:Arq8TciGnqIFy/FlVOTv+RcXbirBFLeHqfojb5RE9+I:SqkciGnqIFy/Mb+RYWr/eWQb0sI

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks