General

  • Target

    aaa99daa48a2a8f2409583c23338a070_JaffaCakes118

  • Size

    7.5MB

  • Sample

    240614-twamqayale

  • MD5

    aaa99daa48a2a8f2409583c23338a070

  • SHA1

    d5ebe0450ab99a719d0500129567ed476fd9a8f9

  • SHA256

    e872d562d5d18903154bb855f50e2b0bfa2e42f062a097e904767ef16c50a05f

  • SHA512

    ea1cd4ad6d9adaf3223ac3001c4012618e42bb5e625d9cee91cdf59b4d1a617ef5ff4efd17b2345daec78d698e5d30bf75702298eab015a76dc0f2517c03e9d9

  • SSDEEP

    196608:nGV4M8PxLBr7zfHQFPj8FB6s4QsN7WBTVaWLXg5za:GexLtwFPQ74QsN7WBTVaWLXg5e

Malware Config

Targets

    • Target

      aaa99daa48a2a8f2409583c23338a070_JaffaCakes118

    • Size

      7.5MB

    • MD5

      aaa99daa48a2a8f2409583c23338a070

    • SHA1

      d5ebe0450ab99a719d0500129567ed476fd9a8f9

    • SHA256

      e872d562d5d18903154bb855f50e2b0bfa2e42f062a097e904767ef16c50a05f

    • SHA512

      ea1cd4ad6d9adaf3223ac3001c4012618e42bb5e625d9cee91cdf59b4d1a617ef5ff4efd17b2345daec78d698e5d30bf75702298eab015a76dc0f2517c03e9d9

    • SSDEEP

      196608:nGV4M8PxLBr7zfHQFPj8FB6s4QsN7WBTVaWLXg5za:GexLtwFPQ74QsN7WBTVaWLXg5e

    Score
    8/10
    • Checks if the Android device is rooted.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Checks the presence of a debugger

    • Target

      MarketUpdateHelper.apk

    • Size

      10KB

    • MD5

      321fe0b4097b97341d8dcfc587092a84

    • SHA1

      cc59927f6e8f4f6072ccee46ae13cd535170facb

    • SHA256

      b7125982d79edf075e427978ec551f04e07c1e9811be0bb2f91d93a7acad8f4d

    • SHA512

      30e10cc2ed8bfda16cea2ce5d5eb5f85422813e79df4a55c68952768f766ac05534d2db367def66f5e17f43f7b7f9d6188c9cf46fbacf5722fc0a8f15f22206e

    • SSDEEP

      192:yWtqgvuo/XLYGrP4m4962fomimnAyotQ9eWo2OK3TSnxIx20QKa:NtquUGIXfZnTotQ0tzK47R

    Score
    1/10

MITRE ATT&CK Matrix

Tasks