General

  • Target

    6f66f747f507e335e152c2834a6a8d3b_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240524-wswf5aec8t

  • MD5

    6f66f747f507e335e152c2834a6a8d3b

  • SHA1

    e193a38781f8df072a36fd629ebdbb3e0bf8d436

  • SHA256

    d1ab9b4310cbcaa36e4e3836b6ff86a6d9dbc5dfc7d2cfbe416c13c0ce31daa4

  • SHA512

    0a370f0bf2cef0221592b28be203b48e465ff45380036af4641d108e9f66a186ceb9ffe07a4372b9b6ad4537572ddc5e3ea0c4b93de9842858ca447342ac6df3

  • SSDEEP

    786432:zM8/h36buzFQqry10nXmBscfWDtt/iK5S4r3eFq:zbh366F8q2BseWDWaJ

Malware Config

Targets

    • Target

      6f66f747f507e335e152c2834a6a8d3b_JaffaCakes118

    • Size

      31.8MB

    • MD5

      6f66f747f507e335e152c2834a6a8d3b

    • SHA1

      e193a38781f8df072a36fd629ebdbb3e0bf8d436

    • SHA256

      d1ab9b4310cbcaa36e4e3836b6ff86a6d9dbc5dfc7d2cfbe416c13c0ce31daa4

    • SHA512

      0a370f0bf2cef0221592b28be203b48e465ff45380036af4641d108e9f66a186ceb9ffe07a4372b9b6ad4537572ddc5e3ea0c4b93de9842858ca447342ac6df3

    • SSDEEP

      786432:zM8/h36buzFQqry10nXmBscfWDtt/iK5S4r3eFq:zbh366F8q2BseWDWaJ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Reads information about phone network operator.

    • Target

      BaiduNaviSDK_3.2.0.png

    • Size

      1.4MB

    • MD5

      4069b3b81e1d891790eef8b76fe90da5

    • SHA1

      94dd6750b919a69aa4692deed2bd40f8bef3418d

    • SHA256

      1d1576c300befb56000fcc082bc035e78dc09d1e58b72c5bb4a10ad5a47601aa

    • SHA512

      bc2415aca54d54ecca819a03b79cf5c47a21400e6e7a82b4b04e58c9e34d22637ac7104f346a2b8f33e24d7bbe634608345efb9d072a7357f9bcf9aa1ad42504

    • SSDEEP

      24576:iCqRqrHPC8nyHyknFMqesGQyL75iB0dVIxwEW6tI8l+AABU8JFo2sYI:JqRqrHPxonMJ5L75UOmwItI8lhcLhsz

    Score
    1/10
    • Target

      BaiduNaviSDK_Resource_3.2.0.png

    • Size

      5.4MB

    • MD5

      3155daab597ef94649630597617806b6

    • SHA1

      38abb21541cf9eef2ad24d4230da0481a7626993

    • SHA256

      9b81928710708fa286edb9885a61173e8ad6c982043a068a2d9f0c5ed63ba011

    • SHA512

      54bdebe7efd0c3ef41256280dd5f5ddef35723f454b53c8e75f1f5c511e29ce64e2c26f909ef06109b26827bdaa115d0bbbcb29b06de40bfbbf36af8f44117d0

    • SSDEEP

      98304:qYUnfdFfumQpQRuxqbvJ5NLsJOf8Cdk7/T0raV671ktGtExUdgecjmbmMXzS2CDA:qY8Pfu1qRkqbv1sEPiQaV+1ktGtExUdz

    Score
    1/10
    • Target

      UPPayPluginEx.apk

    • Size

      499KB

    • MD5

      09b3164fc830f37f7f5abc0bc4fb86eb

    • SHA1

      621a2939d3e8af51c099ff19e0b4df55c3aec4f4

    • SHA256

      ad3fa69dbb3e585235b3ec14dbcf38111552e96b12bd807b25122044f462df13

    • SHA512

      77285d9df07abd8b1c5abe1496a4872a9657023f9b134aa91342f089d4f72cf9b56057928f71aabe81bc6ad371d47a82452617d1861c48e086331ad804ed17bd

    • SSDEEP

      6144:+J7Nqw5ZPz24MMtjLczSGDQs5aDgm1PAGZPqILH8XrT4K0V5hQQ5nCtHWC3fha1V:BwGctXjqQnBAo3ST49sOOHWC3fg1xF4e

    Score
    1/10

MITRE ATT&CK Matrix

Tasks