General

  • Target

    6f64a86ce4bb7cd38076531d86e02d61_JaffaCakes118

  • Size

    22.9MB

  • Sample

    240524-wqqsvsef24

  • MD5

    6f64a86ce4bb7cd38076531d86e02d61

  • SHA1

    49db1e5647ea622ccaa79b041cd1ec5da7c1fd91

  • SHA256

    6ac7f1d6f20a0d0f28e37d5aa097ebc9287979cfdb4603f5c8dfb5cb30ecf36c

  • SHA512

    c284c38169b05b64b289bdabe2fe229672142959be29c3971c488adc7eacf5f0bd853d0f35d2377a4bfed2f9a02d8fa9f3c2e3920cd698e09f64945a7b7c8d0a

  • SSDEEP

    393216:O1B0reAn7H+/a5vUo3RJv/jrIqFYE2VXH2o1bq2VktcdhJRBq01kc:/eovUURx/czXn1OEkSFa01h

Malware Config

Targets

    • Target

      6f64a86ce4bb7cd38076531d86e02d61_JaffaCakes118

    • Size

      22.9MB

    • MD5

      6f64a86ce4bb7cd38076531d86e02d61

    • SHA1

      49db1e5647ea622ccaa79b041cd1ec5da7c1fd91

    • SHA256

      6ac7f1d6f20a0d0f28e37d5aa097ebc9287979cfdb4603f5c8dfb5cb30ecf36c

    • SHA512

      c284c38169b05b64b289bdabe2fe229672142959be29c3971c488adc7eacf5f0bd853d0f35d2377a4bfed2f9a02d8fa9f3c2e3920cd698e09f64945a7b7c8d0a

    • SSDEEP

      393216:O1B0reAn7H+/a5vUo3RJv/jrIqFYE2VXH2o1bq2VktcdhJRBq01kc:/eovUURx/czXn1OEkSFa01h

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks