General

  • Target

    990bec6533c1a00a30a4eac39ce669fc_JaffaCakes118

  • Size

    19.6MB

  • Sample

    240605-yc375sge79

  • MD5

    990bec6533c1a00a30a4eac39ce669fc

  • SHA1

    f21c7b6a879333daedf30bb5872e0a54de1ed708

  • SHA256

    eee64ddf3cddc72a2be7e729d2a57fa1ec61ad6584ae6fdd1b178db2449bbfad

  • SHA512

    7d8b1f9482afc77cfe3dd2e19ed9e75b1f9477da4fcfa34dc9b7fd7b61e1154ceba441389a8ed8235c6311126dd646f83d482ba2d2ec300612338497a07318e4

  • SSDEEP

    393216:24R/ZyUluDeB7sDaOvlC9/HKU/YCRguUfpiLj3kFekkB62MOtUqqcIgzHlyFhiTo:24R5l8eB7EaOvM9/HKU/YCRLZzkFO6AG

Malware Config

Targets

    • Target

      990bec6533c1a00a30a4eac39ce669fc_JaffaCakes118

    • Size

      19.6MB

    • MD5

      990bec6533c1a00a30a4eac39ce669fc

    • SHA1

      f21c7b6a879333daedf30bb5872e0a54de1ed708

    • SHA256

      eee64ddf3cddc72a2be7e729d2a57fa1ec61ad6584ae6fdd1b178db2449bbfad

    • SHA512

      7d8b1f9482afc77cfe3dd2e19ed9e75b1f9477da4fcfa34dc9b7fd7b61e1154ceba441389a8ed8235c6311126dd646f83d482ba2d2ec300612338497a07318e4

    • SSDEEP

      393216:24R/ZyUluDeB7sDaOvlC9/HKU/YCRguUfpiLj3kFekkB62MOtUqqcIgzHlyFhiTo:24R5l8eB7EaOvM9/HKU/YCRLZzkFO6AG

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Target

      stasdk_core

    • Size

      1.0MB

    • MD5

      9f2ba2f2ed15029d1ada6d8d52cf6237

    • SHA1

      3624e212d99eeae25a47ab849159669de8245021

    • SHA256

      aed8bc405b4abb29c5d43614177947b53346366eab46009497b60fb1c3f2b2af

    • SHA512

      8cf3ad644d5ca71f178e187e48050d9006be46bd8587c89094c49305014a0fe256e6b3e4ebfe620b2daf82e50d7c033261169ea33cf6bf5b6d13a379a0719406

    • SSDEEP

      24576:MzNs3d5SA+q8HSPcVOReUvGkc0D+4nDeHWwjY7a5KLEqOQ69k:CW3WA+qMFVIvLc4XCHzjPDzQ6W

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      3c850ffec5bdd850f123077ca210a411

    • SHA1

      1c1ae4678b8a3b65640f047cb1bd72bc70d66f97

    • SHA256

      516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e

    • SHA512

      aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd

    • SSDEEP

      1536:E4A1vm52J1h/mgxeek9/Ckkf1THL8BNbM/DXO8Q/3yJ463v6hHA0UGcVrSj:e9mkJ1tmg/I/tkdP8sa80O42uXcVrE

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      142KB

    • MD5

      f0b930680aa93a62bb77d1916e64a3d7

    • SHA1

      fc30b5641b8d32e4efeaf409d07a4d520a95a6da

    • SHA256

      8f109682334d43d811c7d56620c5eb30c9bc1a89f3f36b91232aeb142a6f6ba7

    • SHA512

      2a503f3aefd5ed8634dbc85cd952d10625e4bc18badc0661c7cfcc3345cfb43ba1e153d9fb264703e4cf0d6c40ac601942e841b9537125072f884c283adb5b99

    • SSDEEP

      3072:mZmii8gAi97ZHbwRILfiNJkAzzBdtCQnm:m8B99TZA/3m

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks