General

  • Target

    13d4954906b5f181b74e015b495e35b5_JaffaCakes118

  • Size

    128.4MB

  • Sample

    241004-sdkjjavbjg

  • MD5

    13d4954906b5f181b74e015b495e35b5

  • SHA1

    2b90e8cce3873ae7a7acdcec560af756ef761341

  • SHA256

    cb550c84c8414bb462a0464d5edd0ab5be538e32da57931c6041f62d1005eff3

  • SHA512

    e80ee8adfbe6ca402f3da613d896a173878e0a83002562a029aa9e70fbc6ab0014010212f4a687f21b005817af4efa5ee6f654171c9d369c0801efbc61a39b2b

  • SSDEEP

    3145728:w3riuWS85OnFNpLQeIPjEo/RSZHVQaAzVcXt2yzVg7B0Kfj:Gp85gp2jT5enAyXtL5g7B0Kfj

Malware Config

Targets

    • Target

      13d4954906b5f181b74e015b495e35b5_JaffaCakes118

    • Size

      128.4MB

    • MD5

      13d4954906b5f181b74e015b495e35b5

    • SHA1

      2b90e8cce3873ae7a7acdcec560af756ef761341

    • SHA256

      cb550c84c8414bb462a0464d5edd0ab5be538e32da57931c6041f62d1005eff3

    • SHA512

      e80ee8adfbe6ca402f3da613d896a173878e0a83002562a029aa9e70fbc6ab0014010212f4a687f21b005817af4efa5ee6f654171c9d369c0801efbc61a39b2b

    • SSDEEP

      3145728:w3riuWS85OnFNpLQeIPjEo/RSZHVQaAzVcXt2yzVg7B0Kfj:Gp85gp2jT5enAyXtL5g7B0Kfj

    • Checks if the Android device is rooted.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      TencentUnipay.apk

    • Size

      2.0MB

    • MD5

      cbfead1291f4fed45cc720e0926cc559

    • SHA1

      fe00dfcbd4cc46d292032600fe3b3003aa883566

    • SHA256

      3acf1c80a021763fe494e0ee9f6f23d413ce80140f104704361bce51f5b6286e

    • SHA512

      4c10eac5ba8a95082807f76335a2929d1bb8bd9ece773d7073e008ac4c1c111b666e8e1824939885ab47669e4ea6eab09ebe513c6bf620e0d87534d9316a9c92

    • SSDEEP

      49152:MDVMagG9JQGa8/M0aQYfbJx1UyYoRXU9NuztfkqiFHu:MGyjHa8k0HYflx1U7oG9EJdT

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks