General

  • Target

    6881b0bf1babb9b5d6625bb75749bb23_JaffaCakes118

  • Size

    27.7MB

  • Sample

    240522-y6h43afd28

  • MD5

    6881b0bf1babb9b5d6625bb75749bb23

  • SHA1

    d8db15db09215a04c25ef5c0f98735eaaabc8631

  • SHA256

    b0ce3539d697c8b1caac383e9e79b6ee46e457ed24799ac1f9f048d7bbbd093b

  • SHA512

    08138f526dea6b78a733ce7a662e0939d9c7be0ff6564f70e5e015aac51fabd3af611887df57a18bb7749c4082d56c5a8684c0413a99714636de209f90d5d128

  • SSDEEP

    786432:R46wkrbTIOdS8JtCxzXWlZswTfuOaNt4/kdD/0:R46w+XDdSsMz05ot4i70

Malware Config

Targets

    • Target

      6881b0bf1babb9b5d6625bb75749bb23_JaffaCakes118

    • Size

      27.7MB

    • MD5

      6881b0bf1babb9b5d6625bb75749bb23

    • SHA1

      d8db15db09215a04c25ef5c0f98735eaaabc8631

    • SHA256

      b0ce3539d697c8b1caac383e9e79b6ee46e457ed24799ac1f9f048d7bbbd093b

    • SHA512

      08138f526dea6b78a733ce7a662e0939d9c7be0ff6564f70e5e015aac51fabd3af611887df57a18bb7749c4082d56c5a8684c0413a99714636de209f90d5d128

    • SSDEEP

      786432:R46wkrbTIOdS8JtCxzXWlZswTfuOaNt4/kdD/0:R46w+XDdSsMz05ot4i70

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      core.jar

    • Size

      394KB

    • MD5

      d00ca7947c80fce95008c94851069c7f

    • SHA1

      65f451bea41861f3bac6e9057b3a8d7981383ff5

    • SHA256

      88c29d12549dbb1df6334a3e16334f085fab330031773eef3edc880ef8efa196

    • SHA512

      d6b7033002921b0ac94a8959e936f54053abb6968d93c9262d64fa54225b7e373685dbba31da56ee31067ce2cbac0fc636f288587ccc974f62a16c828e1b1c2c

    • SSDEEP

      12288:j8zyiTNsMRVj1QgTjZXNl5Hnyw9rOQoTrc7a:AzjDRHQ0jZXN2wJac7a

    Score
    1/10
    • Target

      lib.jar

    • Size

      200KB

    • MD5

      9426a5955f1477b3146d73140e9f37b4

    • SHA1

      19d56ff2b824f258e31b2be93c376e7c2e9622a6

    • SHA256

      80f74f840abb768e8c47010921026245faf417b97f5298f43d250d9109696fd3

    • SHA512

      b477fc5a51695aae0be14a036ba0b081380cb454bb29fbf6a5de882e4ed3b4098441f52fa319ed355e8737db2c490109e33b860017ef26fcc82ead453bc5297c

    • SSDEEP

      3072:/AlLnyRM6ujeHTPQXchlnPY1f0wzZx66OeMMta+8D5/vSkazrZTt:I9nRjCTPQMAZ0wzZyehtOZ6JzrZTt

    Score
    1/10
    • Target

      msg.apk

    • Size

      75KB

    • MD5

      b0b157f34e8f46be0539ba4f412942f7

    • SHA1

      76a8fa8644c37ccb853bc302526a13656bbc1fed

    • SHA256

      86b595cbef75183c0b81edb77058df6fc7548f1d0dcb3c94fafcee5bd08b8c64

    • SHA512

      a8d69079d388d2bb1820ba14fdbf9d10c6a5e9b8fc16c784dd0fd93ad5dee868028c2eb90f8d47fbf72d0366402ae4dc475cd5f52c38081fc9941c75a15261df

    • SSDEEP

      1536:4vExQWUMwyjUYQkPp8dtdOFF6zoXXYn0Uqq89ds8241R9C:3aWUM1jUe88KzoLFqh05C

    Score
    1/10
    • Target

      octopus_sdk.apk

    • Size

      514KB

    • MD5

      d0c4b6d73e8e9083a4cf43dc519c9a21

    • SHA1

      cdbf3e3da2350619268cee11dc29b82b0fb11412

    • SHA256

      9269a8a368171abbce8b7622c43a89917a95789af693b2212685dbfd25d83c86

    • SHA512

      cb4ecce2dd52ce8a60dbfad1556450abca565dde070b73767994ea0ad6dccaa18ceb6eb6dc02678bc0dd9f38ff42cf6fac2b698ef7a581ea312164fa667bae54

    • SSDEEP

      12288:/G0LSjA6/vfL239XFZ36k+dUQm4NKTtkqeof3sdVk:/IaXZgdUXRkqeoPsde

    Score
    1/10
    • Target

      update.jar

    • Size

      5KB

    • MD5

      24ab5295551f62ea9857a2000f87f650

    • SHA1

      4d8966c37a4915c6321e4befbba1bdc17378959b

    • SHA256

      01d9452170e4b34f318d97376f9a76998b4e75e00fe288c3bf0003fc890d6c5e

    • SHA512

      e88fbee85d6df8870ae9ef2e79c888d4ee1461a7dad59104f238f38d1cf2d62026cabf510c0d7b8c6e8e97b5271cf2e7bb9f20e1b5dbaf9ec7647db78c273732

    • SSDEEP

      96:6wDdz4nX9kAh9jB9HMDgPxKpLrGNWnrJmzoY+k3qv8Rdw5F6agd:Fhsio1eUkBrbnXY+k3q4w3gd

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks