General

  • Target

    6863953bf6f524d647db494ee9d2df4f_JaffaCakes118

  • Size

    24.9MB

  • Sample

    240522-ydz7waea2y

  • MD5

    6863953bf6f524d647db494ee9d2df4f

  • SHA1

    fcc8ee1d071fc216bb2cc53b6a2290758c80078d

  • SHA256

    363301e50b775df84cc86bb5fee4fed7be0551f6446d0b3119e30a059d1d739e

  • SHA512

    89d3bc0179ae067867e7ba55ba8f7af364dacf34da3d4fe29e0f7650d099a05aff3cac0889906e94a04b09312cc89005d51a2c5fd82a34d931f43ee82ded1cc1

  • SSDEEP

    393216:u+amaA4nwP22deFRJ4hgfAnbnlkfT4ZzgmCJd3j8zLX/PVBSwvE3dAOPTqKqUqpn:u+baAtP22dkQfBTzCT3j8fXqx3y

Malware Config

Targets

    • Target

      6863953bf6f524d647db494ee9d2df4f_JaffaCakes118

    • Size

      24.9MB

    • MD5

      6863953bf6f524d647db494ee9d2df4f

    • SHA1

      fcc8ee1d071fc216bb2cc53b6a2290758c80078d

    • SHA256

      363301e50b775df84cc86bb5fee4fed7be0551f6446d0b3119e30a059d1d739e

    • SHA512

      89d3bc0179ae067867e7ba55ba8f7af364dacf34da3d4fe29e0f7650d099a05aff3cac0889906e94a04b09312cc89005d51a2c5fd82a34d931f43ee82ded1cc1

    • SSDEEP

      393216:u+amaA4nwP22deFRJ4hgfAnbnlkfT4ZzgmCJd3j8zLX/PVBSwvE3dAOPTqKqUqpn:u+baAtP22dkQfBTzCT3j8fXqx3y

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      core.jar

    • Size

      424KB

    • MD5

      2f9a5169cb37a8505c09076d5ff9b52c

    • SHA1

      f97a01f5b06b3e347b12390dd47db5b77d2d2d5b

    • SHA256

      d68ef158160018c87910d348028f9ff321e9ec4fed514bdeb5495871ac948fa0

    • SHA512

      e3f1c9047fb7d9ba11021d547b82ed5b37031d332ea7dc6c8016ed5b7651145b6ba67d8e1a6ee64c33e4b0372161aa9b97f7618bd4a3c04e9335576d6416669b

    • SSDEEP

      12288:beZKk2VIgF2aLxGkFhiIPCRGzKLc1/NGC:iOt2aLxnPiICcKoZ3

    Score
    1/10
    • Target

      lib.jar

    • Size

      230KB

    • MD5

      30a1fb61eff26693ed22cb900efbc823

    • SHA1

      2809a676ffb3156ac1d1eaa871fef67b7cbeac35

    • SHA256

      b5625b285090baed0a4261197624d55ec4b1ee06ed9534634408757571c34931

    • SHA512

      db29fa0b8b625e2621b65e2f06c05040fa8695d08f33ce2f845c576d08c0ed3748afbef1c1ccab1bda9865c9c738fd817d4168ea03456bb5bbf8fff8f6722fe3

    • SSDEEP

      6144:zlUZEXQvuPqBKZMAJqbiblK49SZ4prQoTvz:zlkEXQ2SM4Q1Qon

    Score
    1/10
    • Target

      msg.apk

    • Size

      75KB

    • MD5

      b0b157f34e8f46be0539ba4f412942f7

    • SHA1

      76a8fa8644c37ccb853bc302526a13656bbc1fed

    • SHA256

      86b595cbef75183c0b81edb77058df6fc7548f1d0dcb3c94fafcee5bd08b8c64

    • SHA512

      a8d69079d388d2bb1820ba14fdbf9d10c6a5e9b8fc16c784dd0fd93ad5dee868028c2eb90f8d47fbf72d0366402ae4dc475cd5f52c38081fc9941c75a15261df

    • SSDEEP

      1536:4vExQWUMwyjUYQkPp8dtdOFF6zoXXYn0Uqq89ds8241R9C:3aWUM1jUe88KzoLFqh05C

    Score
    1/10
    • Target

      octopus_sdk.apk

    • Size

      514KB

    • MD5

      d0c4b6d73e8e9083a4cf43dc519c9a21

    • SHA1

      cdbf3e3da2350619268cee11dc29b82b0fb11412

    • SHA256

      9269a8a368171abbce8b7622c43a89917a95789af693b2212685dbfd25d83c86

    • SHA512

      cb4ecce2dd52ce8a60dbfad1556450abca565dde070b73767994ea0ad6dccaa18ceb6eb6dc02678bc0dd9f38ff42cf6fac2b698ef7a581ea312164fa667bae54

    • SSDEEP

      12288:/G0LSjA6/vfL239XFZ36k+dUQm4NKTtkqeof3sdVk:/IaXZgdUXRkqeoPsde

    Score
    1/10
    • Target

      update.jar

    • Size

      5KB

    • MD5

      02e7798d8bf5cd9c29173af860bf36ca

    • SHA1

      f338e55d6aaa3c72748e9ba6dd93c4e2c899955d

    • SHA256

      8fffd80a5cbe9c49b6008206e8a604adf2f142f882142aae7b7438886fd9a9b8

    • SHA512

      5162f25998927e85d7d7f22d21dbcd5b168a40d567151248440bfeee7a3d4f756336361bb816eb5a6aa9d20aff0a7e3cfd181158e954490a21000362bde3da6a

    • SSDEEP

      96:wpOjhUSGCoXAziO5sPFJXQabCKqvKdLcBh1AF9vUhXL4pQkDiJ4kfN+UROUgFnkQ:djuCbzfKzXQabpqvAyfAvv4L4pQkDiaL

    Score
    1/10

MITRE ATT&CK Matrix

Tasks