General

  • Target

    a7b8b9300898de8578df598c57f0704a_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240614-cypqzswbpn

  • MD5

    a7b8b9300898de8578df598c57f0704a

  • SHA1

    8cc0cda3370155e42f81be4e8ef499fdc8dd60df

  • SHA256

    0f1def56504b72206adb7f27125c6e8608af0ba2d178ce7b54c86b1dcc339e78

  • SHA512

    506a6e86e8a6bdb648ded7ebce98e515d42f67c652c5ba38ac30e8188df222fbfa3e81f01d2c9c8ddd85b63d34354a8192085484b4bbc8d60c3a020ca43bff36

  • SSDEEP

    196608:GEyu/TkEPyFtUmnZfoKJ5d52ZhPbL3bmIsfIgQ8EFqL4GjUPHGC6BqLQUNviGhC:r5/gKm5oKz36PvLmIsf7QvIBUeC6BWQh

Malware Config

Targets

    • Target

      a7b8b9300898de8578df598c57f0704a_JaffaCakes118

    • Size

      11.6MB

    • MD5

      a7b8b9300898de8578df598c57f0704a

    • SHA1

      8cc0cda3370155e42f81be4e8ef499fdc8dd60df

    • SHA256

      0f1def56504b72206adb7f27125c6e8608af0ba2d178ce7b54c86b1dcc339e78

    • SHA512

      506a6e86e8a6bdb648ded7ebce98e515d42f67c652c5ba38ac30e8188df222fbfa3e81f01d2c9c8ddd85b63d34354a8192085484b4bbc8d60c3a020ca43bff36

    • SSDEEP

      196608:GEyu/TkEPyFtUmnZfoKJ5d52ZhPbL3bmIsfIgQ8EFqL4GjUPHGC6BqLQUNviGhC:r5/gKm5oKz36PvLmIsf7QvIBUeC6BWQh

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks