General

  • Target

    9896a6c6761b45c5a99a83f559f6a21c_JaffaCakes118

  • Size

    5.1MB

  • Sample

    240605-tl1fdscd66

  • MD5

    9896a6c6761b45c5a99a83f559f6a21c

  • SHA1

    45b962fac6a8acbde29244483e7a0492a0677063

  • SHA256

    6be93359cbe3875f2254c8afc4dc31bcb522e163211c11ec6c11019f7576fb1c

  • SHA512

    0e6710a16646d568b9e5e7b9f9843aa9d28869889d364f1fd16d8ae55c3f51e0031f66b883e70f8606161426229ca0677a91484233061d1ae4e2cb8dd8c42ad5

  • SSDEEP

    98304:3daQZ3JQLBVVVVVVV0zlq07Ui/OtcV94v3bb8oD/gdJOQRm6qgIXRnCP6xS:cQZDM569kbjMd3c6qgIXxCP6M

Malware Config

Targets

    • Target

      9896a6c6761b45c5a99a83f559f6a21c_JaffaCakes118

    • Size

      5.1MB

    • MD5

      9896a6c6761b45c5a99a83f559f6a21c

    • SHA1

      45b962fac6a8acbde29244483e7a0492a0677063

    • SHA256

      6be93359cbe3875f2254c8afc4dc31bcb522e163211c11ec6c11019f7576fb1c

    • SHA512

      0e6710a16646d568b9e5e7b9f9843aa9d28869889d364f1fd16d8ae55c3f51e0031f66b883e70f8606161426229ca0677a91484233061d1ae4e2cb8dd8c42ad5

    • SSDEEP

      98304:3daQZ3JQLBVVVVVVV0zlq07Ui/OtcV94v3bb8oD/gdJOQRm6qgIXRnCP6xS:cQZDM569kbjMd3c6qgIXxCP6M

    Score
    1/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks