General

  • Target

    ad41eb69b3cae66e84c90db19eb6e8c5_JaffaCakes118

  • Size

    8.9MB

  • Sample

    240615-hv884svgrn

  • MD5

    ad41eb69b3cae66e84c90db19eb6e8c5

  • SHA1

    15dbf9bcb965ad6111ba9a49ea42420552250c67

  • SHA256

    e7974fe2398d7218c27f79b23290253cbad5846c0d0740680c2d67ff0950b2de

  • SHA512

    887d562a95239c6db74dc8c1e59d8afa18a47b0f0f5a37592354f6c446c508825632d6ea92dcd5fe0c4b719b3d24f7c514c924965607633948cb30ea17665743

  • SSDEEP

    196608:OsiSr3XJ/sZHvL1c/rS/I0JItvfxT8J3RbnlyBew:DnMS/rcI041ew

Malware Config

Targets

    • Target

      ad41eb69b3cae66e84c90db19eb6e8c5_JaffaCakes118

    • Size

      8.9MB

    • MD5

      ad41eb69b3cae66e84c90db19eb6e8c5

    • SHA1

      15dbf9bcb965ad6111ba9a49ea42420552250c67

    • SHA256

      e7974fe2398d7218c27f79b23290253cbad5846c0d0740680c2d67ff0950b2de

    • SHA512

      887d562a95239c6db74dc8c1e59d8afa18a47b0f0f5a37592354f6c446c508825632d6ea92dcd5fe0c4b719b3d24f7c514c924965607633948cb30ea17665743

    • SSDEEP

      196608:OsiSr3XJ/sZHvL1c/rS/I0JItvfxT8J3RbnlyBew:DnMS/rcI041ew

    Score
    1/10
    • Target

      UPPayPluginEx.apk

    • Size

      701KB

    • MD5

      5a72136955791fee9222d2e06227ab3a

    • SHA1

      450ea0377064378dc1249ac46eff223480752748

    • SHA256

      afea955403be761ffec0d41687f0819819c2dbb1006fc40535a960b0d13e8282

    • SHA512

      3dd74b3cd81442b4daceec6588945ba4d98a263097390e478f197f03813ba17dfaa0caaf273fdff8e837434749f293f608e106537b733ac24010923695676d14

    • SSDEEP

      12288:AdBQNmgx/FUk3ee4BunZ49lGHwJK4bOluiRfOkZ3eK6kIUXThJRkV+hBO:pNTx/FJexgnGPb01fOLklzRASO

    Score
    1/10
    • Target

      alipay_plugin_20120428msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks