General

  • Target

    67c13a3b9797d1474ed7ea8d2871cf77_JaffaCakes118

  • Size

    11.2MB

  • Sample

    240522-s2mnssga6w

  • MD5

    67c13a3b9797d1474ed7ea8d2871cf77

  • SHA1

    16f5811c98c7d3bc6543cf6c733a82aeb8cd3f87

  • SHA256

    78d6f2b8069c5a464ff8e00d42a2130d1a88ec2c24c09e4aeeef8d93d9af22b3

  • SHA512

    73d253f66f3f60c77948c18bb9d7f4c04143a7e9b59155215d253a6dbc40954adfc4f0b6fae78d64631c9f5b8d3ff6728005a3fbb1a4b08ae93a2cc97b75bb73

  • SSDEEP

    196608:QTfcVZiZH9FJdpNAc5wdFV8Qtyb7i1XT2aRJVInL+yZvJq3pb+bB4bUWJx9HGhyq:Qbv1dXAJVrtO7i1Lf2nL+YJepidkUWlC

Malware Config

Targets

    • Target

      67c13a3b9797d1474ed7ea8d2871cf77_JaffaCakes118

    • Size

      11.2MB

    • MD5

      67c13a3b9797d1474ed7ea8d2871cf77

    • SHA1

      16f5811c98c7d3bc6543cf6c733a82aeb8cd3f87

    • SHA256

      78d6f2b8069c5a464ff8e00d42a2130d1a88ec2c24c09e4aeeef8d93d9af22b3

    • SHA512

      73d253f66f3f60c77948c18bb9d7f4c04143a7e9b59155215d253a6dbc40954adfc4f0b6fae78d64631c9f5b8d3ff6728005a3fbb1a4b08ae93a2cc97b75bb73

    • SSDEEP

      196608:QTfcVZiZH9FJdpNAc5wdFV8Qtyb7i1XT2aRJVInL+yZvJq3pb+bB4bUWJx9HGhyq:Qbv1dXAJVrtO7i1Lf2nL+YJepidkUWlC

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Target

      360AccountCenter.apk

    • Size

      65KB

    • MD5

      0389694b550e63d1e6f8d5990f4954fb

    • SHA1

      c4c1da67bd24d66f66b75248b5fe7474551cff24

    • SHA256

      2404787d7a3d15144a8fecd12bc00d283bbbe7ddbc9fe879881725b9de893c6c

    • SHA512

      a0f50a493d70f6ce1cc89e859ef653da2e64ab985ae5e7b51ae43459bcb5c4ab7496edf0ec6c8eee18b0d12798af673d0136701802fad15ab6358ecc5d246af6

    • SSDEEP

      1536:Qin7Tn9sACV7oXi6RGMpv6lRXJSK0MzeNPijwhxgPXJxxqx:llaiUMkRZSKBeaaxwXdqx

    Score
    1/10
    • Target

      alipay_plugin.apk

    • Size

      354KB

    • MD5

      7b3353b143078dbafd37485f8136728e

    • SHA1

      f2d312754bb2c4854849381997561d09a90b4fb9

    • SHA256

      e86f24838e0aa5527adf3d129652bf70b67990989bf7e8c8d61c3356231ce1ac

    • SHA512

      0f326957abeebaed130da1f6ec7a53de5dd9671d6ae7d975f2b6172af4c323df81efd0f6d4b8a1e4197d5dd35d4419c658f1c936a404bbf9d7e73ee71a5e06f8

    • SSDEEP

      6144:Iv8DL7okgHi/BBs3dWcfihtB7+Y3Ju4g2Tf5C8EcPK+WvyQcy2fny43:Iv67gC/BBsNWfh3VcG5CLE8Rcy2fny43

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      pro.jar

    • Size

      338KB

    • MD5

      bff88fe025332c21d5f2a7ac2cb8e3e3

    • SHA1

      141bc84f6a46fdff9c8ec0791a841fd8e3d6f665

    • SHA256

      8264caf2d562f6f7b6a2555c892d4d0e9badf4044e42e98b311791b135433856

    • SHA512

      242d08fef9e078199a4a9bfe259e0d3dcf68051478139da5dfc554e219146e515b3bddae79e5f796cec109776b5105e38593503de858a6a24c46247438f4293e

    • SSDEEP

      6144:vjJ6nUqBRuNNkA47CdiMB8OePIIwuftiWhJW3BwSdFeeoH2CUJjCx:vjJ6NruNN74mdiMWPQIXFiWhJWusFs/3

    Score
    1/10

MITRE ATT&CK Matrix

Tasks