General

  • Target

    9845f70775095c476ee6b0464b9df09a_JaffaCakes118

  • Size

    16.3MB

  • Sample

    240605-qkt1fagd9w

  • MD5

    9845f70775095c476ee6b0464b9df09a

  • SHA1

    478c97fa9b1e749e01c81d46d7795a722ba97f04

  • SHA256

    d99110fbe921b9d3eaa88276fec88d9a9f3e97d8503f007266f579552506ac4c

  • SHA512

    d7945241c721ebed4ca3eed6383c7169ffd554f94dae34885554e1c426b85dc2ee99e577b3c53141987656019b314ff1129299fd7f028cad67b445bb1f13d2f7

  • SSDEEP

    393216:kxKpnsUocfML6zTRGUzRD4IITAc9mofv0cQbLO+SocAGzwIPzU4ix:kxKps0fML6wwRDDTjFJbLLc/o4ix

Malware Config

Targets

    • Target

      9845f70775095c476ee6b0464b9df09a_JaffaCakes118

    • Size

      16.3MB

    • MD5

      9845f70775095c476ee6b0464b9df09a

    • SHA1

      478c97fa9b1e749e01c81d46d7795a722ba97f04

    • SHA256

      d99110fbe921b9d3eaa88276fec88d9a9f3e97d8503f007266f579552506ac4c

    • SHA512

      d7945241c721ebed4ca3eed6383c7169ffd554f94dae34885554e1c426b85dc2ee99e577b3c53141987656019b314ff1129299fd7f028cad67b445bb1f13d2f7

    • SSDEEP

      393216:kxKpnsUocfML6zTRGUzRD4IITAc9mofv0cQbLO+SocAGzwIPzU4ix:kxKps0fML6wwRDDTjFJbLLc/o4ix

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks