Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ce3c27f2093bc7c87b267643bf530569_JaffaCakes118

  • Size

    5.2MB

  • Sample

    240906-anw17swckl

  • MD5

    ce3c27f2093bc7c87b267643bf530569

  • SHA1

    858a0434136ded6ee2cdc84f689c6ae393bcde63

  • SHA256

    35388c45bd74e105a99bf7c25a15dfd874af229d2891690c9d065945fa972a09

  • SHA512

    63981c9ea9da102ff02eced243c32addcf50e06fbe9550835f081ab0e0585158f1376d600e62c8a41596a028a47c8dbf97fbce7f890f8ef451e5230c0716fedf

  • SSDEEP

    98304:qDQTFIt1C1oWtyHKQcMYmxA/CD4fYQIugFEJGXzeXIcTxzn:qDQTq5GLyxkCD4DjgFEJGXsIIn

Malware Config

Targets

    • Target

      ce3c27f2093bc7c87b267643bf530569_JaffaCakes118

    • Size

      5.2MB

    • MD5

      ce3c27f2093bc7c87b267643bf530569

    • SHA1

      858a0434136ded6ee2cdc84f689c6ae393bcde63

    • SHA256

      35388c45bd74e105a99bf7c25a15dfd874af229d2891690c9d065945fa972a09

    • SHA512

      63981c9ea9da102ff02eced243c32addcf50e06fbe9550835f081ab0e0585158f1376d600e62c8a41596a028a47c8dbf97fbce7f890f8ef451e5230c0716fedf

    • SSDEEP

      98304:qDQTFIt1C1oWtyHKQcMYmxA/CD4fYQIugFEJGXzeXIcTxzn:qDQTq5GLyxkCD4DjgFEJGXsIIn

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      netw

    • Size

      71KB

    • MD5

      72d4c43cc5df5879f63035617f2165b4

    • SHA1

      f91bac0eb388142ab593910e5dc3482cbae49d10

    • SHA256

      d6dfa178fa6b4acdc383c23a5d416c59545d7cc1334fb3919bd6b883101040e7

    • SHA512

      79fcbd0c9d721f44d1b6317a02ac71c0b87f8248442c6c14f6c80fb7cf9aac2cd12cc9d3ba12e97d03d6705221a462f98d49a260da4967c4b8ef14ee634e1f4d

    • SSDEEP

      1536:2RGWE32J6V7ePV3ZESeHbiALbLrztMq2MTFL4u:kGt2J6RePVSFGGzpMEyu

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.