General

  • Target

    81c435459e8b8d24e144d33e924eac92_JaffaCakes118

  • Size

    9.8MB

  • Sample

    240801-zwpdrswerr

  • MD5

    81c435459e8b8d24e144d33e924eac92

  • SHA1

    94533622319010b58871fcdde27f0b48f05c5b58

  • SHA256

    4e8a56e810edccfc9b8ebfef9b6d92bee819e51b08fbf3e3b8ab8afbc3b3c1e6

  • SHA512

    7868a0d932633f09f00d63e344a86dfe8cc61d2662b6561b6bb1e36d154509138ae5db6b589461bad6d2f0537a0834914511b5c81f160a42aa75dff66757f311

  • SSDEEP

    196608:20P38G01sgsN08CPmEroCsXn5jhPfcQu8X/VlgDF06lrDW/uMQuM7v+Lv:W11s/NHCPm2s3PsRm7M7v+Lv

Malware Config

Targets

    • Target

      81c435459e8b8d24e144d33e924eac92_JaffaCakes118

    • Size

      9.8MB

    • MD5

      81c435459e8b8d24e144d33e924eac92

    • SHA1

      94533622319010b58871fcdde27f0b48f05c5b58

    • SHA256

      4e8a56e810edccfc9b8ebfef9b6d92bee819e51b08fbf3e3b8ab8afbc3b3c1e6

    • SHA512

      7868a0d932633f09f00d63e344a86dfe8cc61d2662b6561b6bb1e36d154509138ae5db6b589461bad6d2f0537a0834914511b5c81f160a42aa75dff66757f311

    • SSDEEP

      196608:20P38G01sgsN08CPmEroCsXn5jhPfcQu8X/VlgDF06lrDW/uMQuM7v+Lv:W11s/NHCPm2s3PsRm7M7v+Lv

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.vua

    • Size

      4.2MB

    • MD5

      3200674229ed57cf762fc3d8c5137b55

    • SHA1

      0896d5f138545dc9ddbf0003518880d745c8fe0e

    • SHA256

      333ee74803ab4b114d6217250623869c751a00f4748c826c19ffcd7b29476195

    • SHA512

      31c96314a2b0d80ef3d6c04c0a6894b6a8ebff7e501fd48499ea0e12969ba4ac00cdd844caf839a16cdcffa5b51ee2f33af36a578dfd450c79c7e2bbc0c521ff

    • SSDEEP

      98304:aQn4W5hESDzkY18DTTcDPPIKGPBhFI+sqFkSOO:aQ4W5hEIkg8DTTcDPPIK+HFknO

    Score
    7/10
    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      vivounionsdk.res

    • Size

      29KB

    • MD5

      7a92466708fa1ae45c5585a5b986f5aa

    • SHA1

      e9e8e0dc60208b7a8b64a65550442a73f1166c30

    • SHA256

      cc8416f87003538f2c8ea5280a7eaebfb40597b6ebdcc33c4fa64b0cf08d3b73

    • SHA512

      026dec17ed60d89257c8cb7873a0ccc0de910aad6706f1bbb7936229d7074b9542b7b80a2040f466c64e6cf8896e8531ee01ed7acbfa6a7ed90637a5fe2d477d

    • SSDEEP

      384:RAhiLwh2JKStCYi7PSSDq41bVjDIcRy3ftLYHiLaBsKFj+C:RAV2wYnSDqojDIcsfiHiG3l

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks