General

  • Target

    a401e40b619c172ed746298a29bc1bc4_JaffaCakes118

  • Size

    11.3MB

  • Sample

    240613-f8d9sawbne

  • MD5

    a401e40b619c172ed746298a29bc1bc4

  • SHA1

    f800f6e82df1610e20068eb39dc7edae8bd078b8

  • SHA256

    e3f416a2211dcd463faed04703c51ae58ce6f288ff43e63b72b00cb817abb06e

  • SHA512

    5850c08a8c74e467312398aa536a45e13adfa19bb541adb915b2e04ac70c15aeb69976bc5957cd3f87b3c97e1e9e452c4e739c1eb27a547d5448e9b1c83fd555

  • SSDEEP

    196608:e4JHuTQzqFVI+aR1cfutsjVMDWlffILY+Kpvp1Cp/LNQE6KEWjTtMLCZzTVo9kfd:pHw1FVIQuI0Og6JpY/pr6KZxMLCtTCGd

Malware Config

Targets

    • Target

      a401e40b619c172ed746298a29bc1bc4_JaffaCakes118

    • Size

      11.3MB

    • MD5

      a401e40b619c172ed746298a29bc1bc4

    • SHA1

      f800f6e82df1610e20068eb39dc7edae8bd078b8

    • SHA256

      e3f416a2211dcd463faed04703c51ae58ce6f288ff43e63b72b00cb817abb06e

    • SHA512

      5850c08a8c74e467312398aa536a45e13adfa19bb541adb915b2e04ac70c15aeb69976bc5957cd3f87b3c97e1e9e452c4e739c1eb27a547d5448e9b1c83fd555

    • SSDEEP

      196608:e4JHuTQzqFVI+aR1cfutsjVMDWlffILY+Kpvp1Cp/LNQE6KEWjTtMLCZzTVo9kfd:pHw1FVIQuI0Og6JpY/pr6KZxMLCtTCGd

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      v0.1.11_egret-dex.jar

    • Size

      203KB

    • MD5

      365b90afd2686b80daf08e94808f6845

    • SHA1

      958c6694eb73d01dafc15ca5ebbd0d77b1b9d236

    • SHA256

      5fca62753c0c14331a138acaca2dc20d83fe1b5fff615467e5979527f188b78e

    • SHA512

      dec050f2720354b0498e8a5d361cfbaf4db7c986c0f12bd0d234ab8fd87a011fac53eca0056474d814791530dee719de0f02640258f95dfd5ecd968120aa918c

    • SSDEEP

      3072:xbD/q0Q5tpsuR6Rc0isIsO+DHpq+mbUehJ4MkU8wBwmffr7Ob47MTGp8496Ewhhi:JD/qdOOsIop9YhOMZ3aHTGGu59XYQ

    Score
    1/10
    • Target

      ysdk_hackdex.jar

    • Size

      1KB

    • MD5

      d428e23060b3b30cd1926a33a17f96a4

    • SHA1

      37eb661405ebe0cad99e83ed625cf2bc2e1ae612

    • SHA256

      1f88fdf320cae29d1fd7c639b09ce4d4b468e349cd8bc71376d7c928ffa66f6a

    • SHA512

      daac098768844f55ee1528f40b334b50928ad1862b948a5c942338a36c7cfd947356bbe605bd554e9ac85c00f6a39022c30374625311ce17c36734e291daf2db

    Score
    1/10

MITRE ATT&CK Matrix

Tasks