General

  • Target

    6a02b598d57fabc600e0563e0e17772b_JaffaCakes118

  • Size

    26.2MB

  • Sample

    240523-g2lwqagb28

  • MD5

    6a02b598d57fabc600e0563e0e17772b

  • SHA1

    bc97419f830c20fb2d519c09ffb11dcd234dd348

  • SHA256

    b8893993fc63defa9daa03f1237d1e52c06b48206a68136a0cd317c019fe23fc

  • SHA512

    d0710003042b49f15d32ba07e09369424a45f88873070aa4baf5e57e3fb0d7b91733c99610d3a1cb19512df2104e510b2652b8f7970f594662f777c22b2cba65

  • SSDEEP

    786432:Kw5WV25HQ0IvAWZA0IvAWZb0IvAWZ50IvAWZAF6kF6zF6F:tAc5sf8fdfbfY6U6J6F

Malware Config

Targets

    • Target

      6a02b598d57fabc600e0563e0e17772b_JaffaCakes118

    • Size

      26.2MB

    • MD5

      6a02b598d57fabc600e0563e0e17772b

    • SHA1

      bc97419f830c20fb2d519c09ffb11dcd234dd348

    • SHA256

      b8893993fc63defa9daa03f1237d1e52c06b48206a68136a0cd317c019fe23fc

    • SHA512

      d0710003042b49f15d32ba07e09369424a45f88873070aa4baf5e57e3fb0d7b91733c99610d3a1cb19512df2104e510b2652b8f7970f594662f777c22b2cba65

    • SSDEEP

      786432:Kw5WV25HQ0IvAWZA0IvAWZb0IvAWZ50IvAWZAF6kF6zF6F:tAc5sf8fdfbfY6U6J6F

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      xgsdk-test.apk

    • Size

      42KB

    • MD5

      7f5f04a7ab5ffd9147ffc1510b45777a

    • SHA1

      0083e6e60e46787ebc140907533c62d53e39e3b1

    • SHA256

      7b8d6d0ef98dfdaae5b55432299b396ef57d64c44820217d3ebefac236bd126e

    • SHA512

      0ee7b76fb05562c2f088ba3dfbe885ca27dc3e665893265fcbf4fb5c8c4fc76773f2a8e175c55b3e32152f8793fefb0a0bac835eea47f890c14fc9850e3a2579

    • SSDEEP

      768:HSNyPJHjvBkEwyYQKczx1OMxyeRzxLCefDb9Y4xWxoyYDgOd36rdRp:HSNyPJHj5kEwU5yeRzUefpeYD/srbp

    Score
    1/10

MITRE ATT&CK Matrix

Tasks