General

  • Target

    6a3a8bc64204c4c3d95e814a7f72ac85_JaffaCakes118

  • Size

    10.0MB

  • Sample

    240523-jker7ahh4t

  • MD5

    6a3a8bc64204c4c3d95e814a7f72ac85

  • SHA1

    59dbd4442ccfdf44ff54334b8afe7c142d7c4d97

  • SHA256

    3a27c03db93c30ce802e18a0c781065019812ab5e00b4de407af68304f9bcba4

  • SHA512

    26b4c37a8550b37e5c77a1e364accf375e983d7a2665d95ea2507a32eeaaa17dbb7056cc000a81ca2fc441260332b44c8ec4dfe54814efc92a6baece5e8dace0

  • SSDEEP

    196608:FbatedVTtYVTCpe6xtGv4CXo3dweNDKxZ2MYl93Ql4CN:4teXtMTb6CvmWeNDeZsgl4CN

Malware Config

Targets

    • Target

      6a3a8bc64204c4c3d95e814a7f72ac85_JaffaCakes118

    • Size

      10.0MB

    • MD5

      6a3a8bc64204c4c3d95e814a7f72ac85

    • SHA1

      59dbd4442ccfdf44ff54334b8afe7c142d7c4d97

    • SHA256

      3a27c03db93c30ce802e18a0c781065019812ab5e00b4de407af68304f9bcba4

    • SHA512

      26b4c37a8550b37e5c77a1e364accf375e983d7a2665d95ea2507a32eeaaa17dbb7056cc000a81ca2fc441260332b44c8ec4dfe54814efc92a6baece5e8dace0

    • SSDEEP

      196608:FbatedVTtYVTCpe6xtGv4CXo3dweNDKxZ2MYl93Ql4CN:4teXtMTb6CvmWeNDeZsgl4CN

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      UPPayPluginEx.apk

    • Size

      749KB

    • MD5

      d3efba2691f9bbeed1933fb6a744fd63

    • SHA1

      7d29874eb2191292963ec69d9238678e0600ec10

    • SHA256

      391b81b1be13d3ab3caec5492787491da6594e51fe28752c6e6cc3ad7a6a5785

    • SHA512

      26776ec762579db47fc4c4ebbba4435750b3dffda52e71209934586f0edda442b07f3787a569f5b1e1b808789f57abcaa1e467a4a4ee422c150591ebde5d206e

    • SSDEEP

      12288:AdBQNmgx/FUk3ee4BunZ49fS9+gNOhz/dTbjTLME7pjowOkcN/6kIUXThJRkV+hz:pNTx/FJexgn4Emhz1THfMoowOkcNCklb

    Score
    1/10
    • Target

      alipay_plugin_20120428msp.apk

    • Size

      286KB

    • MD5

      4a89d8a1da67ffb789e71dcced41a691

    • SHA1

      b72bc1d8920ed03c8bfcb8e431169f4508e71976

    • SHA256

      5dab6575a279591032487cd2b8e428f7a90ac8b1fc4eacee245522feba2b2039

    • SHA512

      a09342efcabc691c9efdf256c93e3f326d6785c7b2d6c1d4d12dfbdb676f544fcaa08ca373a550faebe3cdab2b5f82781e28cbf5f4779c3905851876eddc95d3

    • SSDEEP

      6144:OV/Mo6jF1cM8qgmgMPE8fRsrYQ0d0ROgE8XF2Q9WDBRa/dEW7BhDJUK:OVWjFiCgxmpsrYQ0uR48XF2Q9W1R1Wlv

    Score
    1/10

MITRE ATT&CK Matrix

Tasks