General

  • Target

    64cdeaf37991c3d1126e69ef5c582326_JaffaCakes118

  • Size

    17.2MB

  • Sample

    240521-z7cjcaag97

  • MD5

    64cdeaf37991c3d1126e69ef5c582326

  • SHA1

    485c1cf98cd9fa79d81e307507c6a2312c9f0e08

  • SHA256

    8f4cc1976a3e818acacf95ec682ff046b93f556a703860357e5d18661bb68b8b

  • SHA512

    d66d2c2fcd0f673cb1e4f99740fd62fd94bac8d5fb4b04b530a9758ca03f72cc45c5d1b8fce80a86d31e7493978cc242e79621568ee12d54fabd5ac51fe71657

  • SSDEEP

    393216:fXJUdFaZ5nfv97zq00JuIej6txnLFSxdJbSbNA35S0IlW2r:fXJUdFc5ve4IkUbesNAg/r

Malware Config

Targets

    • Target

      64cdeaf37991c3d1126e69ef5c582326_JaffaCakes118

    • Size

      17.2MB

    • MD5

      64cdeaf37991c3d1126e69ef5c582326

    • SHA1

      485c1cf98cd9fa79d81e307507c6a2312c9f0e08

    • SHA256

      8f4cc1976a3e818acacf95ec682ff046b93f556a703860357e5d18661bb68b8b

    • SHA512

      d66d2c2fcd0f673cb1e4f99740fd62fd94bac8d5fb4b04b530a9758ca03f72cc45c5d1b8fce80a86d31e7493978cc242e79621568ee12d54fabd5ac51fe71657

    • SSDEEP

      393216:fXJUdFaZ5nfv97zq00JuIej6txnLFSxdJbSbNA35S0IlW2r:fXJUdFc5ve4IkUbesNAg/r

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      ZqhySafePay.apk

    • Size

      1.0MB

    • MD5

      fd719d8398cdefa19ea1e6771ac920d5

    • SHA1

      24191e6dc40c95f1ef62c59cb6d64caafa71ef26

    • SHA256

      76af0c879267d03328fee2064dcb2fafdbb007f9fabfbf55f543bfd38dc83f00

    • SHA512

      9b638eaff5be9ef1058971f43fdd0dfe7464b34ee33d89139b39dc6b71bcd73184fdda6276dc16433d7f2effb6ff5204760c2d0f427860c0e5f6e5e5e39b209f

    • SSDEEP

      24576:wZ1BEoimgZusEviyw+Usx3jnKTl0ypAF7ltIfhnPvsiNl3:wnaFZ06yhn3Cr8tWhnPvsiNB

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks