General

  • Target

    b473574198a64c77b2cb6918f2339f0e_JaffaCakes118

  • Size

    31.4MB

  • Sample

    240616-wkxdfs1cnc

  • MD5

    b473574198a64c77b2cb6918f2339f0e

  • SHA1

    096b9a046371fd93abb365ca33ebd08346d1e7d3

  • SHA256

    122288db7310aef7738bad25e04e4b4c57fb93ea93d51e3cb631914c976b2022

  • SHA512

    74a5497702e9bc9e238cb31792d4097302edb099f5c7abe3c9bf2f2a824ae3cf60f2fea8bd186008db8f43e0f4ce10a46634ea776067b452dcfba8875082642e

  • SSDEEP

    786432:Sa/7Y/3m2MGRi6rbmGdbVHCkMxsUX/dazg3wtx591NdUYqmvjnsW:h/7Y/d73PPdbMxBXIzg3Ivb4TmjH

Malware Config

Targets

    • Target

      b473574198a64c77b2cb6918f2339f0e_JaffaCakes118

    • Size

      31.4MB

    • MD5

      b473574198a64c77b2cb6918f2339f0e

    • SHA1

      096b9a046371fd93abb365ca33ebd08346d1e7d3

    • SHA256

      122288db7310aef7738bad25e04e4b4c57fb93ea93d51e3cb631914c976b2022

    • SHA512

      74a5497702e9bc9e238cb31792d4097302edb099f5c7abe3c9bf2f2a824ae3cf60f2fea8bd186008db8f43e0f4ce10a46634ea776067b452dcfba8875082642e

    • SSDEEP

      786432:Sa/7Y/3m2MGRi6rbmGdbVHCkMxsUX/dazg3wtx591NdUYqmvjnsW:h/7Y/d73PPdbMxBXIzg3Ivb4TmjH

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      __xadsdk__remote__final__.jar

    • Size

      83KB

    • MD5

      63fdef103e88af155bed4d6d466964e4

    • SHA1

      5a1be20892e18c536d0d883a5bf1462ea216bebd

    • SHA256

      cfcf91ea26d1be5b17fc3757ef0e90942c078f4e8cdd88c7e72db6f260978de8

    • SHA512

      8f299787a5254ade32d8cfaa04758a16f8a6f17e24bd60e90afc4b20382f6abb78a098e1104799c1c462c2237ac67b2a5b5ab4cba62c8c3cdc3a4d8a4cc13709

    • SSDEEP

      1536:nlwzW+Faqlh7+uLyVFkke/mynCKQxsOxaG5Y1wAK1btK203sYIRwQHY6Adtu0BqC:n8FdT5yLjep5Qxs0GQ1btZiDI2Z6wuCL

    Score
    1/10
    • Target

      bdxadsdk.jar

    • Size

      195KB

    • MD5

      c3b999326b7187bdd85fd971f93376d6

    • SHA1

      978fa76710506b2aa2dc1502e2697355cc64e34e

    • SHA256

      555e565b45d2b030652d914830ad427d15182797886316024a2f04df6ac81d5e

    • SHA512

      240981a457a3df5ce7f51ae1e0b323efc37b349a261e21d52ef8e9256d758f5c7dd4bcd6411ca2dc247de1beec2ad1a0f7f49d2370971c8c65f95b0d6c14b31e

    • SSDEEP

      3072:bFg/OTNG1obNXB45vAEsreszccGiXzU+wtBJPkyzy4H/mqku/DjEWKVQNCDu:u/Ow+x69ftc9XzStBJ8y5mqkYDjv3Gu

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      420KB

    • MD5

      f0ee7f7dd1ef4e5cd436ed6e1c609e5a

    • SHA1

      7d112abb7896294b075721b0200f0812ed65a418

    • SHA256

      0906bca7332f10d1bdc98b04eb5ad9de2af5da0590b5615aa5f66852b78d9369

    • SHA512

      5912538f74fcbe24bba5e3eef2804fd160ccd002bf144e30dd910c9d52d6a3e2dc172a3baa1f6d64ed93346a9b1d4760ae17ec6d1c7c8a4de8cb9264b82bf2be

    • SSDEEP

      6144:mQCx8Rp2KiQB/B4Qfdw3Vr/+rwWTLAUq3PwB32k59CruFIBSSAOC8hkIwx:ok/z/BJfdUW8W8ho4k59tSaOCckIS

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks