General

  • Target

    bc09669643719de03fc2396aa75966ea_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240618-p4q78aycpp

  • MD5

    bc09669643719de03fc2396aa75966ea

  • SHA1

    b5253b515be233f3b7c9eae33af3f8a3e2404807

  • SHA256

    49c3212ed29b61a297f9c27a5c879000504a5b615c33bc32f3ba211c182012a0

  • SHA512

    bfa0a297de34968720c09111715d42eb14ca8b0f42ebd7b3eb80edd87209df6b0fb7c04cb0261f3ef1f500ecd03b4f4f98b8b87f77574aad1b80d7533976fcdb

  • SSDEEP

    196608:tTdZoF/mJO0SPGDpvOgirWl/WldYlkwwra:dd2wJOLeDBVirsOYetra

Malware Config

Targets

    • Target

      bc09669643719de03fc2396aa75966ea_JaffaCakes118

    • Size

      6.1MB

    • MD5

      bc09669643719de03fc2396aa75966ea

    • SHA1

      b5253b515be233f3b7c9eae33af3f8a3e2404807

    • SHA256

      49c3212ed29b61a297f9c27a5c879000504a5b615c33bc32f3ba211c182012a0

    • SHA512

      bfa0a297de34968720c09111715d42eb14ca8b0f42ebd7b3eb80edd87209df6b0fb7c04cb0261f3ef1f500ecd03b4f4f98b8b87f77574aad1b80d7533976fcdb

    • SSDEEP

      196608:tTdZoF/mJO0SPGDpvOgirWl/WldYlkwwra:dd2wJOLeDBVirsOYetra

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      com.skymobi.pay.opplugin_V2009.apk

    • Size

      164KB

    • MD5

      a40c1207bf356c7732a1b2a6bb610124

    • SHA1

      3195c52690165edb510ad4c22b0eeae5f19de06b

    • SHA256

      e2c0a59924b10f0af536580e4ae995827c951b10f5e47ac1a8f23082d891de5b

    • SHA512

      5730bb406b25a7a666855db11cf8b36e4be1cf1e8813d787389d898770fc035a7cab94706692ffc36450274e97a04b6ba05929ab624f51914e730873c5cf8618

    • SSDEEP

      3072:yvz+O85MQUtKgrLBOqZuhZgUIB3Bpq2rLNTrfJpq7cIhSBo:O+Om6hgqgk7BRpdpTrhM77hWo

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks