General

  • Target

    98905c07a5fd12c9fadb1d06d5f68f0d_JaffaCakes118

  • Size

    29.3MB

  • Sample

    240605-tgtr2scc34

  • MD5

    98905c07a5fd12c9fadb1d06d5f68f0d

  • SHA1

    c72c4cb5fcae3a12c8e773f8eaeff55ee0f1937e

  • SHA256

    f6034e75b17cce56db6148cb478f6dd86c834fec34c4fd034c24c73074e84ec7

  • SHA512

    5dd930ed3620e1003580cbaba815567d7bab4a4fe6675bb703392ac96bbcee6fabc61659591f7c710e9102f9a1d0d0115b97c3d42e1b7caf58cc243061f864a8

  • SSDEEP

    786432:eyudJthlitVdKPlHmd+O1l+eXkuBQ181jvb+A9mtD:et7QV8dXe8OFvbPmtD

Malware Config

Targets

    • Target

      98905c07a5fd12c9fadb1d06d5f68f0d_JaffaCakes118

    • Size

      29.3MB

    • MD5

      98905c07a5fd12c9fadb1d06d5f68f0d

    • SHA1

      c72c4cb5fcae3a12c8e773f8eaeff55ee0f1937e

    • SHA256

      f6034e75b17cce56db6148cb478f6dd86c834fec34c4fd034c24c73074e84ec7

    • SHA512

      5dd930ed3620e1003580cbaba815567d7bab4a4fe6675bb703392ac96bbcee6fabc61659591f7c710e9102f9a1d0d0115b97c3d42e1b7caf58cc243061f864a8

    • SSDEEP

      786432:eyudJthlitVdKPlHmd+O1l+eXkuBQ181jvb+A9mtD:et7QV8dXe8OFvbPmtD

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Target

      TenpayService.apk

    • Size

      402KB

    • MD5

      ec1863f8eefc993fd05d121563c324b3

    • SHA1

      f95da79b308a766fbf1f85ce16185694b31a7500

    • SHA256

      d4fd1ddf5c5a85cf9fc2589aa9ef694338bde77b2dcd1e606ee99c436241328b

    • SHA512

      9a819f225c3d144dd571ed9d1c1966aa70d5ce9f5f7637fc1c43ce6a643785b14d6e1f8fcecddac3393ffc2bf03304628425c5e2032121a5b0b1c8e88bad7731

    • SSDEEP

      6144:jBTLiBv153C+A9lp6S2ZEiUG/SYvQi/h1bSbRMCvsrVnEvSMCXfYq:lTLivtC+mlTsERlYvQWh129MwWVQCf3

    Score
    1/10
    • Target

      alipay_plugin_20121018133442msp.apk

    • Size

      748KB

    • MD5

      d06ea38e4210a87d6b96f8b0491df677

    • SHA1

      3ba573396398757088e559a9d372049a377eb05a

    • SHA256

      76a24f83ad15586ff9a2081e420a707be9ddb0b5047e5b6de5974c41624ff2c1

    • SHA512

      3d43e5bfad2b703a804a53048b6a88228a11fb80ac641d6594f774cc07f6c7367e0ee80b29966d02c9206542f467f55b0f1ddbbfef0ec372256314a7d1071f30

    • SSDEEP

      12288:IjRAsoln+WMB1EgrGERh4xWgtSM7vXrRCn4I5p2Cnfv:IjRApZ+WM7yER61P7jw4IGSfv

    Score
    1/10
    • Target

      autonavi_Resource1_1_0.png

    • Size

      318KB

    • MD5

      68fa4f01f3f106811e54b969b6d406af

    • SHA1

      4564bc1ac42e39e5fd999aa6800bb4f812d63e73

    • SHA256

      9fde418e0d8603824464bc57378598714cf944bf3ebdc960af50b68fa7d55a7c

    • SHA512

      58c61768c87aed4163d7a91c73aaae1410b817fbb07801cf4b2045e5934829026f5e6832a4d39964ac4ca424c3bcf7f346f6942036871eeb32c38e7ec31ebcb6

    • SSDEEP

      6144:Okoi+70zgH87PpWopeGN6UCZmqQ0aPYFss3z2RePu2uvOfVimj:Okoi+7XM+GN6UmaPYFb3Vu2uGfVimj

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks