Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    99abbda11ec5969113bbe95637096f8e_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240606-bctx5sdc3x

  • MD5

    99abbda11ec5969113bbe95637096f8e

  • SHA1

    0b48e5de770070193fdbb215b71d5f264d7531bc

  • SHA256

    da685282a15b8481cc7a8e8924f350830f3f197d208acfeed67dc0c4c7c5f708

  • SHA512

    403588a60ed03b04012ff8108d3c48ded2d56322fab3b4e5618f232c4bb7ebc79f701e6e86b4f6e16054ea6e4c74a29d4446ad1af85477c790c0f2759675ef3e

  • SSDEEP

    393216:1GgdaYTClcx9uICa63bbJw3zPzoNy0MqT:1FQlc3uIJ6nJw37zoQAT

Malware Config

Targets

    • Target

      99abbda11ec5969113bbe95637096f8e_JaffaCakes118

    • Size

      12.3MB

    • MD5

      99abbda11ec5969113bbe95637096f8e

    • SHA1

      0b48e5de770070193fdbb215b71d5f264d7531bc

    • SHA256

      da685282a15b8481cc7a8e8924f350830f3f197d208acfeed67dc0c4c7c5f708

    • SHA512

      403588a60ed03b04012ff8108d3c48ded2d56322fab3b4e5618f232c4bb7ebc79f701e6e86b4f6e16054ea6e4c74a29d4446ad1af85477c790c0f2759675ef3e

    • SSDEEP

      393216:1GgdaYTClcx9uICa63bbJw3zPzoNy0MqT:1FQlc3uIJ6nJw37zoQAT

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      636KB

    • MD5

      cf57d4f9f2ccd86816c4f02989252423

    • SHA1

      6978f24478ba9baa004bf4d21db251fe67957ec2

    • SHA256

      e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec

    • SHA512

      f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b

    • SSDEEP

      12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks