General

  • Target

    6842bc0a4a007d76ec5c2c236d6c9ecd_JaffaCakes118

  • Size

    8.0MB

  • Sample

    240522-xgxqgscf2t

  • MD5

    6842bc0a4a007d76ec5c2c236d6c9ecd

  • SHA1

    d67063bfcdf3dfeb8d2cbb34c921d7949af5be2d

  • SHA256

    530c1fac0943c157d372396ffc4e1990ffac3538c92c23292b1fa0cd1d68467f

  • SHA512

    307291dd3aceaad3b62874b2d63c463329e1fd5a63b5eee940e70d229dc6ac93c6f1f3936678a358a92e83c9af1c9dc78bc12a0f9856b1c9065cf37e72f81bc3

  • SSDEEP

    196608:N/OuWRnfxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxM98MQ9HElcV/ZUhmc5:N2uWJxxxxxxxxxxxxxxxxxxxxxxxxxxq

Malware Config

Targets

    • Target

      6842bc0a4a007d76ec5c2c236d6c9ecd_JaffaCakes118

    • Size

      8.0MB

    • MD5

      6842bc0a4a007d76ec5c2c236d6c9ecd

    • SHA1

      d67063bfcdf3dfeb8d2cbb34c921d7949af5be2d

    • SHA256

      530c1fac0943c157d372396ffc4e1990ffac3538c92c23292b1fa0cd1d68467f

    • SHA512

      307291dd3aceaad3b62874b2d63c463329e1fd5a63b5eee940e70d229dc6ac93c6f1f3936678a358a92e83c9af1c9dc78bc12a0f9856b1c9065cf37e72f81bc3

    • SSDEEP

      196608:N/OuWRnfxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxM98MQ9HElcV/ZUhmc5:N2uWJxxxxxxxxxxxxxxxxxxxxxxxxxxq

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      __xadsdk__remote__final__.jar

    • Size

      83KB

    • MD5

      607e65052147713115dd87f0866d504c

    • SHA1

      5ff2a1c2ebedeb61236c56edfde6406828a05c6c

    • SHA256

      fe2fe2810faab43ae935927bfde6faafb8c74532f760afbecff9585d4404e741

    • SHA512

      2bc7144ac0c6dfbcf097f778ee110405d9c58f4fc4901356c2cf2622d7a4f6b12ce30a51f168962a8c81fbab9c46a65c2b219633dd2a80cc345dbf255cebf2a1

    • SSDEEP

      1536:eKSS1UbomStT19s4G0/GZzgrF2nPOgfbexVK8RV+0XUv5VzUxwh3MPeUivu5iy:DSYsStT1ZT/ugrFsmgsHWzUxq3MPeUi8

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      748KB

    • MD5

      d06ea38e4210a87d6b96f8b0491df677

    • SHA1

      3ba573396398757088e559a9d372049a377eb05a

    • SHA256

      76a24f83ad15586ff9a2081e420a707be9ddb0b5047e5b6de5974c41624ff2c1

    • SHA512

      3d43e5bfad2b703a804a53048b6a88228a11fb80ac641d6594f774cc07f6c7367e0ee80b29966d02c9206542f467f55b0f1ddbbfef0ec372256314a7d1071f30

    • SSDEEP

      12288:IjRAsoln+WMB1EgrGERh4xWgtSM7vXrRCn4I5p2Cnfv:IjRApZ+WM7yER61P7jw4IGSfv

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      88KB

    • MD5

      0586f3074966b353fe050ec4055ca09c

    • SHA1

      645839dc107ba400711b8f4d8e4495dc29ac8ee0

    • SHA256

      e365ac88dc01033ccf02fe965d5e1eee9044c4ca1a3d9d96085be6a427a5274a

    • SHA512

      e76d878ec99c64cff35a11a5837237206bb02b1cc2d35ff2c0f03c72519bc19813138f54a6aca6c775b33de532a011dee7949ecddb7b57e4264380d70b81e4a5

    • SSDEEP

      1536:ZIyPme+AtVhpPhvh8Ba1e6Z5KgXJMfl24RnuFo398/FhluO4HyafAtQOz672r:9OefrzPhyh0KgXJ2l2nqt8/FhwfWQ1y

    Score
    1/10
    • Target

      qhad_dynamic1113.jar

    • Size

      107KB

    • MD5

      3a06586ad5987b00b4a73759e61b126a

    • SHA1

      36a769a65efb56582e39dbce9c506795e9594fe7

    • SHA256

      2bfa01452d94c5cfecb0d2e9aa5488c59077d2f57736afa824a9a8c6bc75cbc9

    • SHA512

      97cb126fbb49b63c220eb3088e4bfe04f16bcc3bac75d0c8e8ab6d0d1da94522b3962002ffd8fc73a46c4de4b54929d5129d892da67173aae24f57d23dfd1572

    • SSDEEP

      3072:AeOnptLKufnZall64CrZbUXFn/Q+jJxLF:SKknxNV+9xLF

    Score
    1/10

MITRE ATT&CK Matrix

Tasks