General

  • Target

    6a0ea91dc9d03804c4b44e68c9620fce_JaffaCakes118

  • Size

    20.0MB

  • Sample

    240523-hdqqfage5x

  • MD5

    6a0ea91dc9d03804c4b44e68c9620fce

  • SHA1

    74d02e97ba09a72c2c28e5ccae7ce22182ab6461

  • SHA256

    25e5152fe12d3a3d01b20f72f6791ac3f0caeadc6fdc718071dbf1aab2823313

  • SHA512

    7a2d6cd733582a7da2eadb390d3874eb0cd14faca0ec8ab674d2eb5777cb4b4514b0f54877ac3c44ab42a527866235123099ce66c06f0027ae6ddd1ff88bcb8f

  • SSDEEP

    393216:nlChdgfKG5pG9QMuk9R5egv5HuVcCTBQoa9vRXh3/NaxrfdOimy8pmlI9uY:nIdAKGTG9JFvv5O932ZXd/NaRf9mECQY

Malware Config

Targets

    • Target

      6a0ea91dc9d03804c4b44e68c9620fce_JaffaCakes118

    • Size

      20.0MB

    • MD5

      6a0ea91dc9d03804c4b44e68c9620fce

    • SHA1

      74d02e97ba09a72c2c28e5ccae7ce22182ab6461

    • SHA256

      25e5152fe12d3a3d01b20f72f6791ac3f0caeadc6fdc718071dbf1aab2823313

    • SHA512

      7a2d6cd733582a7da2eadb390d3874eb0cd14faca0ec8ab674d2eb5777cb4b4514b0f54877ac3c44ab42a527866235123099ce66c06f0027ae6ddd1ff88bcb8f

    • SSDEEP

      393216:nlChdgfKG5pG9QMuk9R5egv5HuVcCTBQoa9vRXh3/NaxrfdOimy8pmlI9uY:nIdAKGTG9JFvv5O932ZXd/NaRf9mECQY

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks