General

  • Target

    6d4f1048406e3f28359a11eab862778c_JaffaCakes118

  • Size

    30.9MB

  • Sample

    240524-ev2mgsch41

  • MD5

    6d4f1048406e3f28359a11eab862778c

  • SHA1

    8d1544cf83ae59432c66f15bf843b618cfbea0ea

  • SHA256

    7d90eeeff15e6c5173621e7caf065797d490ccf48c5472c3f0317f5f7e9a3c1e

  • SHA512

    d1b56dddf43450364c06d181cff941a01bcec60d2ca507601475f42a50f888eba654a72187a25af49f0803d1a14092e879a3ac3b60366845617e1d8f489dbc3b

  • SSDEEP

    786432:w5JnNSzEk8DMstLxKiv/evt0nje5JwnwikhUUjxro42IWB:WnN2Ek0PQJvt0na5MePjxrlm

Malware Config

Targets

    • Target

      6d4f1048406e3f28359a11eab862778c_JaffaCakes118

    • Size

      30.9MB

    • MD5

      6d4f1048406e3f28359a11eab862778c

    • SHA1

      8d1544cf83ae59432c66f15bf843b618cfbea0ea

    • SHA256

      7d90eeeff15e6c5173621e7caf065797d490ccf48c5472c3f0317f5f7e9a3c1e

    • SHA512

      d1b56dddf43450364c06d181cff941a01bcec60d2ca507601475f42a50f888eba654a72187a25af49f0803d1a14092e879a3ac3b60366845617e1d8f489dbc3b

    • SSDEEP

      786432:w5JnNSzEk8DMstLxKiv/evt0nje5JwnwikhUUjxro42IWB:WnN2Ek0PQJvt0na5MePjxrlm

    Score
    1/10
    • Target

      TenpayService.apk

    • Size

      402KB

    • MD5

      ec1863f8eefc993fd05d121563c324b3

    • SHA1

      f95da79b308a766fbf1f85ce16185694b31a7500

    • SHA256

      d4fd1ddf5c5a85cf9fc2589aa9ef694338bde77b2dcd1e606ee99c436241328b

    • SHA512

      9a819f225c3d144dd571ed9d1c1966aa70d5ce9f5f7637fc1c43ce6a643785b14d6e1f8fcecddac3393ffc2bf03304628425c5e2032121a5b0b1c8e88bad7731

    • SSDEEP

      6144:jBTLiBv153C+A9lp6S2ZEiUG/SYvQi/h1bSbRMCvsrVnEvSMCXfYq:lTLivtC+mlTsERlYvQWh129MwWVQCf3

    Score
    1/10
    • Target

      alipay.apk

    • Size

      350KB

    • MD5

      b1305a5e4779e06a6c654258b02dfb15

    • SHA1

      f9e387482bc9649fba2aaf04ba6ae02334651223

    • SHA256

      258c17f04df6697fccf9ae1479f35543bd4a4081edda48a1ea2c37bc1b870e6a

    • SHA512

      9a3f94b5d38dfa8f7e6b24c0dde0b940e48a757e8634754f3c37050d826e620dfc1838c783d99e94f97b08dd7474d7b619a22d037d414300c3874476fdc90cfd

    • SSDEEP

      6144:5FeKnPt0/sEGId2fuRmlxLwEd0r2FfS4QlV7G8v9oKvFuQL2bBV2fnayx5:5FeKFFEGc2ymsMa4QlV7G8Ge62fnayv

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      com.skymobi.pay.opplugin_v2021.apk

    • Size

      173KB

    • MD5

      3edbac1230a96869372ac635700b3eae

    • SHA1

      249ad654d9667c5dc9029e2ac83b13c535981cab

    • SHA256

      84d73dc5d83a3214abfb19758de28937e17a2d65cbdd13fd5737d1da70fdf54b

    • SHA512

      0e33be921a9c2ce12a9cb18bf6aaebbe29fe507832c7b99edba329efa90ef6c9821cef039a2b311285d4e7c21789590570ecb8d0e99c72c693cf704a6075ee50

    • SSDEEP

      3072:rPov8HnBnKtYleLG4514DKewGZUFg+vK9uJ8nNYjB856bMYg8/4pNqHWe7jHTCJf:LovAnBnAYlP4514mbcTn2Busg8/+NaWZ

    Score
    1/10
    • Target

      unicom_resource.dat

    • Size

      139KB

    • MD5

      6088cd3228debc405bf311bb303cdbbb

    • SHA1

      33b28585187d90e5b22b732fc97309bae7141408

    • SHA256

      0e83be96976f936927c16e709622396d814df47fe634f430b4b556e0a9c8b1e5

    • SHA512

      bba92ecd4be50306db8fc220cd97a8bf3023f268450fe5e58edd24f61f3dd224c6f4fe5614d3395b8ee456cf25b72f46881889ec193aa04b07bc6778eafc8280

    • SSDEEP

      3072:Z5IP4TzmQPGCrBN5cMcI5go0FhsRuFjuttuppt0:Z5yXaGCrBLVfgxFhGuauK

    Score
    1/10

MITRE ATT&CK Matrix

Tasks