General

  • Target

    bbea1165be5f93178549a3b1d4cc32ee_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240618-pld5yaxelr

  • MD5

    bbea1165be5f93178549a3b1d4cc32ee

  • SHA1

    66e60058cc0fdc7ccb1c195b9cdee792224191bb

  • SHA256

    66caad02e32eeb68173fdc9053acc3a65b0b61e3075baced0e475d714991f35a

  • SHA512

    dba1b363369ae2d38dc258a473eb6fbb01c46eb808ab494ea3a51b614e711146aab5c9170f7edd15133849d0b4e59af39d00e9f24d1ee73ba8b349b4a51aee7a

  • SSDEEP

    98304:p5cxSwT3ncoNtll31BX7MVbpMd27c+Y9UJKy1aOwzqAZERiTDLEAp:p1wYoNtf7MAbUJKy1a6eu8LEAp

Malware Config

Targets

    • Target

      bbea1165be5f93178549a3b1d4cc32ee_JaffaCakes118

    • Size

      3.7MB

    • MD5

      bbea1165be5f93178549a3b1d4cc32ee

    • SHA1

      66e60058cc0fdc7ccb1c195b9cdee792224191bb

    • SHA256

      66caad02e32eeb68173fdc9053acc3a65b0b61e3075baced0e475d714991f35a

    • SHA512

      dba1b363369ae2d38dc258a473eb6fbb01c46eb808ab494ea3a51b614e711146aab5c9170f7edd15133849d0b4e59af39d00e9f24d1ee73ba8b349b4a51aee7a

    • SSDEEP

      98304:p5cxSwT3ncoNtll31BX7MVbpMd27c+Y9UJKy1aOwzqAZERiTDLEAp:p1wYoNtf7MAbUJKy1a6eu8LEAp

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Acquires the wake lock

    • Queries information about active data network

    • Target

      com.skymobi.pay.opplugin_V2006.apk

    • Size

      174KB

    • MD5

      1b8aefd551f08399d7f34b2cad89490f

    • SHA1

      2345c3f9e1af2b227fa7f12208f0626b0269cc7f

    • SHA256

      33b590ba1e064c5f19b536d40ba2719bf34f6884fa397f062e9b9e4ee4d9be0a

    • SHA512

      6a2e04384ee830d6743a05abd4f9f16f298eb9aed8c456eb385fceb194e52568b77fe18bc882c1dad1a1d8c50ce1c82d503d5a92422fb148bf78b8095e49ea52

    • SSDEEP

      3072:uFvz+v5jThlzRZ2JiQnv/Spm17QqzrGMpnOtTbVwFgskNq16ghAXppHI:uh+lTTlsJv/SpmZBfO9bVwFUM6qF

    Score
    1/10
    • Target

      jolopay-r-510.jar

    • Size

      37KB

    • MD5

      642e7c262700e484f24031cc80795280

    • SHA1

      6cd21398f4d01ef06146e6b5cbe0d0677e640fd4

    • SHA256

      67b27d88ca8503a017b4e23e56bfe8333bd469fb53985e71a02e5a8159a0f739

    • SHA512

      e9267dd46b3d91e1efe5061ddb8ab31fabe6713ef25d52a1ea80c271b34700ac190d75e0b396eb3b54bdb4cebc4260e0b0bd7e41fa3d608c584c09386eea25a1

    • SSDEEP

      768:1ypaRGImqo5U0DC7suTz3shH3chQq3fWjh3rNQcNN/P:1y5eo5fDC77TjshH3UFvm3rL5

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks