General

  • Target

    69d6d8ead349eebf292feeebceef3e02_JaffaCakes118

  • Size

    11.0MB

  • Sample

    240523-fvd2vseg89

  • MD5

    69d6d8ead349eebf292feeebceef3e02

  • SHA1

    c583f95d68d26643cf14d74f7895b726a0bac0a5

  • SHA256

    65997ac52ac0a1ecaf8ad8c5010a1fe28191d8ac296757d08d4ec78a2dc8cbe6

  • SHA512

    dc788712c1612cdbd2b5e5fcdf7827f80fa8b3d3b52029ce0ef8da1fc1a982aa2301a2bcbf91c74dc27dac033c1868f8f75c7745910dea77388eabe760deb515

  • SSDEEP

    196608:rc3BSdDlUU8TSldAKcQcx0rVwUqqK5Iw42vTLx9Vko1lUhFg9FQ/j2:AMdDuUbldHchKrVAMwJvTLXOl/j2

Malware Config

Targets

    • Target

      69d6d8ead349eebf292feeebceef3e02_JaffaCakes118

    • Size

      11.0MB

    • MD5

      69d6d8ead349eebf292feeebceef3e02

    • SHA1

      c583f95d68d26643cf14d74f7895b726a0bac0a5

    • SHA256

      65997ac52ac0a1ecaf8ad8c5010a1fe28191d8ac296757d08d4ec78a2dc8cbe6

    • SHA512

      dc788712c1612cdbd2b5e5fcdf7827f80fa8b3d3b52029ce0ef8da1fc1a982aa2301a2bcbf91c74dc27dac033c1868f8f75c7745910dea77388eabe760deb515

    • SSDEEP

      196608:rc3BSdDlUU8TSldAKcQcx0rVwUqqK5Iw42vTLx9Vko1lUhFg9FQ/j2:AMdDuUbldHchKrVAMwJvTLXOl/j2

    Score
    1/10
    • Target

      7723box_pjz.apk

    • Size

      3.3MB

    • MD5

      2dbfa511a770cb9923d85b15a9841848

    • SHA1

      7618c9af34437781884bec561d12ed2a0781e56a

    • SHA256

      07d5827ef21744d399bf1888c198a3715235c887c0abc82cba3545b9864c3837

    • SHA512

      fa718fde2af8f491407c927550410eb5eb6a40dc4df144507bd63b285ab7e8b630db85d11da5572b5ecb5b88ed38cc1cdc0d2fa7007717c17ac67ac859ac24be

    • SSDEEP

      98304:V3XuuHwWUJrVwUOLuAXaK2Koz8sdw428SlZLx9pvY:hx0rVwUqqK5Iw42vTLx9VY

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks