Overview
overview
8Static
static
66d4f104840...18.apk
android-9-x86
16d4f104840...18.apk
android-11-x64
1TenpayService.apk
android-9-x86
1alipay.apk
android-9-x86
8com.skymob...21.apk
android-9-x86
com.skymob...21.apk
android-10-x64
com.skymob...21.apk
android-11-x64
unicom_resource.apk
android-9-x86
1unicom_resource.apk
android-10-x64
1unicom_resource.apk
android-11-x64
1Analysis
-
max time kernel
4s -
max time network
166s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
24-05-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
6d4f1048406e3f28359a11eab862778c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6d4f1048406e3f28359a11eab862778c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
TenpayService.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
alipay.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
com.skymobi.pay.opplugin_v2021.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral6
Sample
com.skymobi.pay.opplugin_v2021.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral7
Sample
com.skymobi.pay.opplugin_v2021.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
unicom_resource.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
unicom_resource.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral10
Sample
unicom_resource.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
alipay.apk
-
Size
350KB
-
MD5
b1305a5e4779e06a6c654258b02dfb15
-
SHA1
f9e387482bc9649fba2aaf04ba6ae02334651223
-
SHA256
258c17f04df6697fccf9ae1479f35543bd4a4081edda48a1ea2c37bc1b870e6a
-
SHA512
9a3f94b5d38dfa8f7e6b24c0dde0b940e48a757e8634754f3c37050d826e620dfc1838c783d99e94f97b08dd7474d7b619a22d037d414300c3874476fdc90cfd
-
SSDEEP
6144:5FeKnPt0/sEGId2fuRmlxLwEd0r2FfS4QlV7G8v9oKvFuQL2bBV2fnayx5:5FeKFFEGc2ymsMa4QlV7G8Ge62fnayv
Malware Config
Signatures
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.alipay.android.appdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.alipay.android.app -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.alipay.android.appdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.alipay.android.app
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/alipay/logs/2024-05-24/4-16-49.logFilesize
279B
MD542530b83564ae1fb9413e28bd85466b5
SHA11203b2e29cdeafc1c5eace922e0aa5530aefaf7e
SHA256c2200aa8890d3166e00189b8f4ee42a9b0489735fd75cb3a7968a5bbfc2186d4
SHA5120662e61b3e85108087a8d70d382e7702ee9fe401c4d6d2bc5166491d399c40c404de12c3c386b0863be6c9ceb3d2155c45eeabd19decfbc4e47369edc466cf75