Resubmissions
28-08-2024 23:31
240828-3h76hasbrg 10General
-
Target
c7d89216e74edf933ce8f5a467e9b245_JaffaCakes118
-
Size
10.8MB
-
Sample
240828-3h76hasbrg
-
MD5
c7d89216e74edf933ce8f5a467e9b245
-
SHA1
3c4f5437fabecbb4b747896b0161f21c33f71122
-
SHA256
6119f226c79c0e1a34106c08a174dd55de90d6c4160ee0bd6d589a504c42d8d1
-
SHA512
8f7c9623f60019e2fe209806700a1e0b0a91e3d448400a081f558c9769ff18ac3e82116305a5d5be788f9d824d559c604b6870dffd38d31258ea53dd1dfcb32b
-
SSDEEP
196608:bjH9Cno8MNlQstqztOuYe7iPDRsUdB8GOxUviNISmkxoIlThOIYJnbS352sE:bjdCKlQsAztOdJdvK6SmSYU/E
Behavioral task
behavioral1
Sample
c7d89216e74edf933ce8f5a467e9b245_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
alipay_plugin_20120428msp.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
alipay_plugin_20120428msp.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
alipay_plugin_20120428msp.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c7d89216e74edf933ce8f5a467e9b245_JaffaCakes118
-
Size
10.8MB
-
MD5
c7d89216e74edf933ce8f5a467e9b245
-
SHA1
3c4f5437fabecbb4b747896b0161f21c33f71122
-
SHA256
6119f226c79c0e1a34106c08a174dd55de90d6c4160ee0bd6d589a504c42d8d1
-
SHA512
8f7c9623f60019e2fe209806700a1e0b0a91e3d448400a081f558c9769ff18ac3e82116305a5d5be788f9d824d559c604b6870dffd38d31258ea53dd1dfcb32b
-
SSDEEP
196608:bjH9Cno8MNlQstqztOuYe7iPDRsUdB8GOxUviNISmkxoIlThOIYJnbS352sE:bjdCKlQsAztOdJdvK6SmSYU/E
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the call log.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
UPPayPluginEx.apk
-
Size
749KB
-
MD5
d3efba2691f9bbeed1933fb6a744fd63
-
SHA1
7d29874eb2191292963ec69d9238678e0600ec10
-
SHA256
391b81b1be13d3ab3caec5492787491da6594e51fe28752c6e6cc3ad7a6a5785
-
SHA512
26776ec762579db47fc4c4ebbba4435750b3dffda52e71209934586f0edda442b07f3787a569f5b1e1b808789f57abcaa1e467a4a4ee422c150591ebde5d206e
-
SSDEEP
12288:AdBQNmgx/FUk3ee4BunZ49fS9+gNOhz/dTbjTLME7pjowOkcN/6kIUXThJRkV+hz:pNTx/FJexgn4Emhz1THfMoowOkcNCklb
Score1/10 -
-
-
Target
alipay_plugin_20120428msp.apk
-
Size
286KB
-
MD5
4a89d8a1da67ffb789e71dcced41a691
-
SHA1
b72bc1d8920ed03c8bfcb8e431169f4508e71976
-
SHA256
5dab6575a279591032487cd2b8e428f7a90ac8b1fc4eacee245522feba2b2039
-
SHA512
a09342efcabc691c9efdf256c93e3f326d6785c7b2d6c1d4d12dfbdb676f544fcaa08ca373a550faebe3cdab2b5f82781e28cbf5f4779c3905851876eddc95d3
-
SSDEEP
6144:OV/Mo6jF1cM8qgmgMPE8fRsrYQ0d0ROgE8XF2Q9WDBRa/dEW7BhDJUK:OVWjFiCgxmpsrYQ0uR48XF2Q9W1R1Wlv
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1