General

  • Target

    ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118

  • Size

    4.9MB

  • Sample

    240615-jb5bgsscrc

  • MD5

    ad5628a05ded0e8c12bbd5a6690012b1

  • SHA1

    208fa5f7958b2208fca890684fe51d8a3c575d2c

  • SHA256

    eb6bd4f48e5f52379bd252664f003e4b649303b6a6b1a385c4775f42b4e4825c

  • SHA512

    5f5b0143d5e46702db206c9291b0da0d415bee461793cd5028e5e20c8923169c895f10868c10c7fb6dd288773da73dc394754ab8a6396813c4d40a7a6b9167e8

  • SSDEEP

    98304:lz3dYYyz+vSNq8z2Gp3qftw38z2GeI08mVuGomgowf:lrdYY3kz2w0qgYI08mV2txf

Malware Config

Targets

    • Target

      ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118

    • Size

      4.9MB

    • MD5

      ad5628a05ded0e8c12bbd5a6690012b1

    • SHA1

      208fa5f7958b2208fca890684fe51d8a3c575d2c

    • SHA256

      eb6bd4f48e5f52379bd252664f003e4b649303b6a6b1a385c4775f42b4e4825c

    • SHA512

      5f5b0143d5e46702db206c9291b0da0d415bee461793cd5028e5e20c8923169c895f10868c10c7fb6dd288773da73dc394754ab8a6396813c4d40a7a6b9167e8

    • SSDEEP

      98304:lz3dYYyz+vSNq8z2Gp3qftw38z2GeI08mVuGomgowf:lrdYY3kz2w0qgYI08mV2txf

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the call log.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Target

      com.jiubang.goscreenlock.simpletheme.zip

    • Size

      1.1MB

    • MD5

      45f4307602f7dc8109e9245107d27b5c

    • SHA1

      e07a34524efa3bb97abdadde4258c6e7906f1e07

    • SHA256

      68c8747ba85ee7945145dc5e8e89ed50106c6793da5499837b614c51554dbc96

    • SHA512

      50174dbdb035e9c82233a879797d1c204ad7cdfe8f9f81592c8fe5be1e3dd2e814884737cc59fdd289e46375c86d1e76a6f303038e561e8f6903c6e1be029236

    • SSDEEP

      24576:M2bHzlqRDq72xwx3++laIj1h404V7Tc/k3s:M2bJIzwl6Kic/p

    Score
    1/10
    • Target

      com.jiubang.goscreenlock.theme.zero.zip

    • Size

      949KB

    • MD5

      5787104f9c64fe205cdc3b357e917bbf

    • SHA1

      2afbc09e8babe89e033fd12b962a32e46591e9bc

    • SHA256

      e5d9ed8e5389a3e1d6f8deac1a52c2b2e9b57d7ba70cea5f3b562a9e057260f9

    • SHA512

      5428d2854be35c86983285acbf920e185eca36fdd6134c84660fdae356b7d0252f55a04e8c32b05446a7cbbe8f547394e1ef7d0792c2e318098399d280c52a45

    • SSDEEP

      24576:BvnWzJmdnxYcQJ/d724sbhNo4zqGVk7PKhDe:FcJgxYpdghNoLGVSKhDe

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks