General

  • Target

    98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118

  • Size

    14.6MB

  • Sample

    240605-wjmgvsde41

  • MD5

    98d91d4e761d8bbc987a924b5d4b728e

  • SHA1

    b65459dc9caa57ec173a59708110f7db4d469fa9

  • SHA256

    e542f150c7eaf25c2adfb9ae27a7f76056cba91f0ba5886d0c2ba5f24cd7768a

  • SHA512

    d0bdfab887a236202b3e0c99ca71a49be3cd385095b6e5c1a14d9434c866c4722eb91fd82a6e44c5e99a254b4b658e3e4f374da568ed112e328411cba5f91748

  • SSDEEP

    393216:LoRir8Ef0x07KvKZPSS7m61p96/kTwT+ibjn+Rupo3AY:kR88H0ey3bYGwTD3n+Ua33

Malware Config

Targets

    • Target

      98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118

    • Size

      14.6MB

    • MD5

      98d91d4e761d8bbc987a924b5d4b728e

    • SHA1

      b65459dc9caa57ec173a59708110f7db4d469fa9

    • SHA256

      e542f150c7eaf25c2adfb9ae27a7f76056cba91f0ba5886d0c2ba5f24cd7768a

    • SHA512

      d0bdfab887a236202b3e0c99ca71a49be3cd385095b6e5c1a14d9434c866c4722eb91fd82a6e44c5e99a254b4b658e3e4f374da568ed112e328411cba5f91748

    • SSDEEP

      393216:LoRir8Ef0x07KvKZPSS7m61p96/kTwT+ibjn+Rupo3AY:kR88H0ey3bYGwTD3n+Ua33

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      aisdk_qtt.jar

    • Size

      87KB

    • MD5

      9897bba0414afdbc86926201931f3c7d

    • SHA1

      06e1c2132c233cbe815cc273b0c66bf9a540a2be

    • SHA256

      043eb5ad663b848191f5bf995f3b9fb345ae9aa6fe8054285fe3d554ba1c3481

    • SHA512

      bb566c1a31b1c24b8b039bd48a632addd57250da4c6af5917eff8f792e1b4df22b96331b6d0bf327a879f9fea5c515c8d6c18f550389f3369b0e033563092275

    • SSDEEP

      1536:BwDxNcrJyNtIyhU/NtapF/lCwtaExMA/UTR0rFqFY4+ZdBHXfd/MYSXtH5VC7p/:7DltSztaZA/TQFYvXHxMYSW/

    Score
    1/10
    • Target

      bdxadsdk.jar

    • Size

      193KB

    • MD5

      1526ec33e4c8df4103971b9d652f91cb

    • SHA1

      dc86db07fd3f5884880fab40da1042e11eac6bc2

    • SHA256

      e29aeaf797cdb6ae53975a234a2053822db364868205eddd4ff86dddd3fe4e2c

    • SHA512

      524f2a1d16b2b8112ac4282891add556a0d80166cfbe813d9782f3455b431785622344117e20131f5f73787c6e3862701e4173b4f67ad56ed360589135af781c

    • SSDEEP

      6144:0f+ySvP+fvJJrLk/T2BC8zFjRmr067fcymDAD91pBbkllZe:DvP+fDrLkyBComrPzczC9Dyjc

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      241KB

    • MD5

      19d7bf7285443f001adbac6ccb106b50

    • SHA1

      3627cbed497866718cf332381327834490a37339

    • SHA256

      06dd9cef1fd3eb208c9f900458a8028c3468f91c8df74e02c71bd31e8a1f4a02

    • SHA512

      a6c470d607fa0ef2ea3e8ca0509a0b2e1c10cb949ff0bfc52d31f61087fcda5e66fdb1caecf3e1176476cdadf96c1bc3a83a59a0b06f3628957fbda28845509f

    • SSDEEP

      6144:Ey0Z5aFYVVDtYg7ZnBafqlOmavy7lGGl6+y:Ey0Z5EMm3fN5vdU6+y

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks