General

  • Target

    ea75954886b6499570e5708fbacf27ba_JaffaCakes118

  • Size

    30.6MB

  • Sample

    240919-df1wzaxflr

  • MD5

    ea75954886b6499570e5708fbacf27ba

  • SHA1

    2ee70fd989b73eaaab4ed1e7d3872519ad96cff9

  • SHA256

    df3f27b7cec3fdaa995e10446b3340782695a6cdbb296093dad4df4b771f3e46

  • SHA512

    5d6eca648d95faba0b43b58e47ef7c6d6bdfcdd56c013625521704b8e13103b427acefa82babd69b762a77ccaed4d677bf6fcdacceefc50b19bd99d14bab6b2f

  • SSDEEP

    786432:VjEjnTjEFtsk7HCN16vz3CuipaFh6CI3qo2W4A:VEDTTk7iN1EGuiQ/6CIqW4A

Malware Config

Targets

    • Target

      ea75954886b6499570e5708fbacf27ba_JaffaCakes118

    • Size

      30.6MB

    • MD5

      ea75954886b6499570e5708fbacf27ba

    • SHA1

      2ee70fd989b73eaaab4ed1e7d3872519ad96cff9

    • SHA256

      df3f27b7cec3fdaa995e10446b3340782695a6cdbb296093dad4df4b771f3e46

    • SHA512

      5d6eca648d95faba0b43b58e47ef7c6d6bdfcdd56c013625521704b8e13103b427acefa82babd69b762a77ccaed4d677bf6fcdacceefc50b19bd99d14bab6b2f

    • SSDEEP

      786432:VjEjnTjEFtsk7HCN16vz3CuipaFh6CI3qo2W4A:VEDTTk7iN1EGuiQ/6CIqW4A

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Target

      kyx_data

    • Size

      7.1MB

    • MD5

      ff3c001f814d7585bad97d0fcaaf44e0

    • SHA1

      c4a03329a69e1c644820e61d89c9722d6badcb91

    • SHA256

      b6e51aad7f3d4e437e3dafa3c4de6824b250eb16a63ec736b65224c64ba7146f

    • SHA512

      a6fb7c5adab6ad62004e30bd79749b485a02585f384f648e09ad8660dacbeb68015712fc6c9c9e49ff999c371d8b48c5807232ab167bec56a4419c4a8895f0a5

    • SSDEEP

      196608:pNQLKdTxeSji8rAB9zKWvEc7LlX6lbcggC2XB7ya:687WQAR8qlX6Vl2Xl

    Score
    1/10
    • Target

      AdServer.apk

    • Size

      1.1MB

    • MD5

      73c2ac27961b9db4274ca13a178c0fa2

    • SHA1

      3d1b1a8f6c9bc63fc88068c71e98bbe70797d03e

    • SHA256

      751012d560a3c16a6f377f403ea12b9c6805a279d84c08210f9a5543c5bef42e

    • SHA512

      591bf3bd1316189616aed273c5bdcb49ed1c46fc7bdf6ee1db9ce11b317dbfda5477989cc3ceafaa2e02dc6555afa1ac4ba872ea27d9a8ae9b5a9ac3abadcef8

    • SSDEEP

      24576:ceJTiQnLEw7efCr8vTbmTttkKilyMtnqjAysPf0+fm4Hfr:D4w7ear830tup4anq9a3m4HD

    Score
    1/10
    • Target

      analytics_core.apk

    • Size

      159KB

    • MD5

      d2e90bb505f20fc73baf25805b0273aa

    • SHA1

      240fbbfda194a65761baed6f3546bc4c744a1850

    • SHA256

      77060ad812f5e6e9e896c39bc548f8295238eaa9941e1986e8e024e7d2114309

    • SHA512

      c2ef3f79b6cfb171b0904ff8138238cbf985344d91d6d9ec35472d14233d1b108cc0234259e8286cbb099747cc8d9d2f74c8c7394ab3a6dcfc2cc95e168c8c85

    • SSDEEP

      3072:/vnDHScqJUCqi8p27PhJkqOjvxSWnNoPuKAaSWk8V4rpCPd7H7sl3eX0emR7KDD:7ScaCioePDaZdnNdFDJCPJoKvmtiD

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks