General

  • Target

    644cc7902d55c825bea755edc53e4da0_JaffaCakes118

  • Size

    18.2MB

  • Sample

    240521-w2v7qaea79

  • MD5

    644cc7902d55c825bea755edc53e4da0

  • SHA1

    135ad43f5f32a8e81da19ddd5093896c21f2fbab

  • SHA256

    98c57bb1cd6ef93ee8742a8de9e49bf60a0a7fdc8efbadd5b719e0929a635953

  • SHA512

    1d96a143a9e47d77cce0db2d039e56207bceaa43d838bfb4bcc1796df27b9b120a470c0358a187af66e76f2801993f29466ee493b3bb67c7431c40d95020c5ab

  • SSDEEP

    196608:1rSQ/54R8hNGUY/xuBJ2cRdU+ZrvOu/oYPJ5xE0egfHDyXqQ0QeLoseund07rZTs:xSPR8V7RjJw+fUfe0JTGK7sc3xbmqqTT

Malware Config

Targets

    • Target

      644cc7902d55c825bea755edc53e4da0_JaffaCakes118

    • Size

      18.2MB

    • MD5

      644cc7902d55c825bea755edc53e4da0

    • SHA1

      135ad43f5f32a8e81da19ddd5093896c21f2fbab

    • SHA256

      98c57bb1cd6ef93ee8742a8de9e49bf60a0a7fdc8efbadd5b719e0929a635953

    • SHA512

      1d96a143a9e47d77cce0db2d039e56207bceaa43d838bfb4bcc1796df27b9b120a470c0358a187af66e76f2801993f29466ee493b3bb67c7431c40d95020c5ab

    • SSDEEP

      196608:1rSQ/54R8hNGUY/xuBJ2cRdU+ZrvOu/oYPJ5xE0egfHDyXqQ0QeLoseund07rZTs:xSPR8V7RjJw+fUfe0JTGK7sc3xbmqqTT

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      unicom_resource.dat

    • Size

      41KB

    • MD5

      1099cc55782e9dfbea4df0cc9c42e8af

    • SHA1

      c398368af914bbc35187b15201ab9b10de3f0592

    • SHA256

      7ae180774a4f784d4ebc21650295cea6269d0c4a1884a5af815930ee47553279

    • SHA512

      e6dcdac4c51042db8a91f25cf9d1461c0b4284a5138086fb3264e7090840aa6ca144f18e7bc498d0ecd1d131804193d94bdf471e8ada15f7b30b2bb8359adef8

    • SSDEEP

      768:R8gYCYCpONOKIfwiFWAkEsDVop56mAOvuGMC21q0dkHj:9PRpO4KsOOvuG3+dkD

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks