General

  • Target

    a844db6c33af9995ae278e6faef2291b_JaffaCakes118

  • Size

    10.7MB

  • Sample

    240614-gw92cs1hlj

  • MD5

    a844db6c33af9995ae278e6faef2291b

  • SHA1

    da77cd180d8d45b3c3a3d208a559dc7da57fbe1e

  • SHA256

    503961a0cb2cf1784cdd28b558b059bcf5e74b6d0b125c7c9255405139f21242

  • SHA512

    8d138e585f2ea5ee6ad03b3f84695053bec4c5cc4bc712181e08482c297ea1dcb6c45576eefb6dc40b94f877a4f164d6b7322e60e1ff5ded89694ac9af5abe40

  • SSDEEP

    196608:GURJzbQcFjuOl6/tkv/pB/EZ4dsg/DoG6LLsdqUD0i6cB2QT21qOOfkFwTMNki:BRBbQYjuOl6/tCBcJw/ebK1BwHs1i

Malware Config

Targets

    • Target

      a844db6c33af9995ae278e6faef2291b_JaffaCakes118

    • Size

      10.7MB

    • MD5

      a844db6c33af9995ae278e6faef2291b

    • SHA1

      da77cd180d8d45b3c3a3d208a559dc7da57fbe1e

    • SHA256

      503961a0cb2cf1784cdd28b558b059bcf5e74b6d0b125c7c9255405139f21242

    • SHA512

      8d138e585f2ea5ee6ad03b3f84695053bec4c5cc4bc712181e08482c297ea1dcb6c45576eefb6dc40b94f877a4f164d6b7322e60e1ff5ded89694ac9af5abe40

    • SSDEEP

      196608:GURJzbQcFjuOl6/tkv/pB/EZ4dsg/DoG6LLsdqUD0i6cB2QT21qOOfkFwTMNki:BRBbQYjuOl6/tCBcJw/ebK1BwHs1i

    Score
    4/10
    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks