General

  • Target

    8860fab54906da2c12c05944c9cfd0db_JaffaCakes118

  • Size

    9.5MB

  • Sample

    240531-z4tnfsdf4y

  • MD5

    8860fab54906da2c12c05944c9cfd0db

  • SHA1

    eb34b8818e975b62543d786a78e5ac5620620bd4

  • SHA256

    120a6635318dd1c0f3ed40914907f631246346a702c4ad0895829c5619400a00

  • SHA512

    027059504ad349d17bcce6c53c2b1a572fa9093c288e8c03c16999293f5db333fed6528bf27e88ad3b6a497f751873133b97c0e452cf00e7dd195f31ad3dd752

  • SSDEEP

    196608:nESpeDo1n2/8TbVigNIQo/0G6pMMvpRhk94D8G2FrFJymbO4m0:3pIoV2U8sz1auJND8GErFJymbO4m0

Malware Config

Targets

    • Target

      8860fab54906da2c12c05944c9cfd0db_JaffaCakes118

    • Size

      9.5MB

    • MD5

      8860fab54906da2c12c05944c9cfd0db

    • SHA1

      eb34b8818e975b62543d786a78e5ac5620620bd4

    • SHA256

      120a6635318dd1c0f3ed40914907f631246346a702c4ad0895829c5619400a00

    • SHA512

      027059504ad349d17bcce6c53c2b1a572fa9093c288e8c03c16999293f5db333fed6528bf27e88ad3b6a497f751873133b97c0e452cf00e7dd195f31ad3dd752

    • SSDEEP

      196608:nESpeDo1n2/8TbVigNIQo/0G6pMMvpRhk94D8G2FrFJymbO4m0:3pIoV2U8sz1auJND8GErFJymbO4m0

    Score
    1/10
    • Target

      GH.data

    • Size

      1.6MB

    • MD5

      e6647c7982823f7e0c49bf9de9e8ca1c

    • SHA1

      56669c77eb3bbb867a470d623496a555d935aa1b

    • SHA256

      6da698faf823ce4cd97d214609d54291da5e3a18561c9a648cba8bbe47595f02

    • SHA512

      bcfc2924ee57b898475fd5c3fb8c9cb001ad2ebca717e60f384720c05441fef4ec00ad777d144c9d15dad8c2e34e3b8b78e067bd1b72a8dc59c2f20d5002b05b

    • SSDEEP

      24576:ygaJGEBLRACbCG4jh4k3QiDkrsPTVwogNeAranxYfks:ygaJGENRACubjh4k3Q0WmHgNlr0xwks

    Score
    6/10
    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      alipay_v3.5.2.0425.apk

    • Size

      350KB

    • MD5

      c29cc43c5512eb48b90d43d549505871

    • SHA1

      7e6ff0eb4e17b3700ef5d2021248e2b8fd926791

    • SHA256

      691ece790addffd0529abde87906261459755654c4e38aad4b1a0ef03762abe9

    • SHA512

      b97adbf01266f61ff3b56d6befc93bf6bfab21bfd47164d0e8482c5356ff486d4fcade2d114200819194def27c9b764e7d6c56566ddc31c2da95650b794510b1

    • SSDEEP

      6144:1FSi/zC0/sEGId2fuRmlxLwEd0r2xfS4QlV7G8v9oKvFuQL2bBV2fn+SgAV:1FSimFEGc2ymsQa4QlV7G8Ge62fn+m

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks