General

  • Target

    548a355e9ab43cc847930638ec1bdee2_JaffaCakes118

  • Size

    868KB

  • Sample

    240518-nwy3eshh75

  • MD5

    548a355e9ab43cc847930638ec1bdee2

  • SHA1

    8e8d50b35d5059f91fe65d6829ff5dcad50aaa95

  • SHA256

    bfb26b7f54e142193e59a4f7bc9b796c3d745cbe02cbbb670af417cec2d1e044

  • SHA512

    6a7f1da871115347a90fe4c0cc6851239e4b96cb128a202c658b914f1036bd7dd7aae17d041b8a025c2645595972957b044eb5aa3d83f9852c8f0ccba4a0f46e

  • SSDEEP

    24576:+zNimmnQFNSxDWoDNMWaY3Axlb6d6ZX93:kL+QF4N1aYKAeXB

Malware Config

Targets

    • Target

      548a355e9ab43cc847930638ec1bdee2_JaffaCakes118

    • Size

      868KB

    • MD5

      548a355e9ab43cc847930638ec1bdee2

    • SHA1

      8e8d50b35d5059f91fe65d6829ff5dcad50aaa95

    • SHA256

      bfb26b7f54e142193e59a4f7bc9b796c3d745cbe02cbbb670af417cec2d1e044

    • SHA512

      6a7f1da871115347a90fe4c0cc6851239e4b96cb128a202c658b914f1036bd7dd7aae17d041b8a025c2645595972957b044eb5aa3d83f9852c8f0ccba4a0f46e

    • SSDEEP

      24576:+zNimmnQFNSxDWoDNMWaY3Axlb6d6ZX93:kL+QF4N1aYKAeXB

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      3c850ffec5bdd850f123077ca210a411

    • SHA1

      1c1ae4678b8a3b65640f047cb1bd72bc70d66f97

    • SHA256

      516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e

    • SHA512

      aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd

    • SSDEEP

      1536:E4A1vm52J1h/mgxeek9/Ckkf1THL8BNbM/DXO8Q/3yJ463v6hHA0UGcVrSj:e9mkJ1tmg/I/tkdP8sa80O42uXcVrE

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      142KB

    • MD5

      f0b930680aa93a62bb77d1916e64a3d7

    • SHA1

      fc30b5641b8d32e4efeaf409d07a4d520a95a6da

    • SHA256

      8f109682334d43d811c7d56620c5eb30c9bc1a89f3f36b91232aeb142a6f6ba7

    • SHA512

      2a503f3aefd5ed8634dbc85cd952d10625e4bc18badc0661c7cfcc3345cfb43ba1e153d9fb264703e4cf0d6c40ac601942e841b9537125072f884c283adb5b99

    • SSDEEP

      3072:mZmii8gAi97ZHbwRILfiNJkAzzBdtCQnm:m8B99TZA/3m

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks