General

  • Target

    39323c36a76154b3fc16b6fde78dabf7_JaffaCakes118

  • Size

    2.4MB

  • Sample

    241012-kqdbzssdqh

  • MD5

    39323c36a76154b3fc16b6fde78dabf7

  • SHA1

    5ae270b2296e656f56cd0a155feb722707039ca1

  • SHA256

    3f6c59e8d669799afd4d7a255c16d09cc04306b295fac0b612fb4a7948216a1b

  • SHA512

    96cd7b85eda52272eec8cbfe05bb543b1a551c00d09e3cb8b87294606d224823192ca47a72078f6cc5a72ff221a3dafc658a6f5ef1f9fdd0cb62225e270b35ba

  • SSDEEP

    49152:uRNJaPnL7GLQ2y5GTLqzRLY3Kp6xVMHiDzGxHkA489z7JPfdz:aJa3OryU5e6kHiXGxHkA4w3Jdz

Malware Config

Targets

    • Target

      39323c36a76154b3fc16b6fde78dabf7_JaffaCakes118

    • Size

      2.4MB

    • MD5

      39323c36a76154b3fc16b6fde78dabf7

    • SHA1

      5ae270b2296e656f56cd0a155feb722707039ca1

    • SHA256

      3f6c59e8d669799afd4d7a255c16d09cc04306b295fac0b612fb4a7948216a1b

    • SHA512

      96cd7b85eda52272eec8cbfe05bb543b1a551c00d09e3cb8b87294606d224823192ca47a72078f6cc5a72ff221a3dafc658a6f5ef1f9fdd0cb62225e270b35ba

    • SSDEEP

      49152:uRNJaPnL7GLQ2y5GTLqzRLY3Kp6xVMHiDzGxHkA489z7JPfdz:aJa3OryU5e6kHiXGxHkA4w3Jdz

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Target

      com.skymobi.pay.plugin.main_v10014.pl

    • Size

      58KB

    • MD5

      b0a39aaa44ac82ec0fd321914f6aa668

    • SHA1

      10a20428675480d68cbc64a5a4be12bde81aaca2

    • SHA256

      e44f6d6dc173a53f4d7e4bbcbc92bf991ffea14af1612ee29b81f56c33b6d5ef

    • SHA512

      fde8a61b36e3a27acd98ce24b594b71690456c40f76785dac0a4809f66570d4196b60e1e47616cf9855faac18822fe6d953b59534a39506daa15c7a285d70999

    • SSDEEP

      1536:3a3tkLIW2T8X1S2TN6DH3twagFsydRWd69RJwC27nLt:qmkW1lSiNsaapSRWd61wd7Lt

    Score
    1/10
    • Target

      com.skymobi.pay.plugin.recordupload_v10009.pl

    • Size

      38KB

    • MD5

      55c24dc00f667f62ee0cc0dfca41fc28

    • SHA1

      1811dd0ba5f5bdfeef743332b7ef1b8e4097a23c

    • SHA256

      8199c84eb1412ac9f13edc3bff4cd66e788847143bd0c8497ce7f699a0d68e77

    • SHA512

      b5a5269065f4bcf05c560315255c49dc7eafc015458eca425f6b44eec0ee74c3e1d481e06df70deca25056a8fd070efb5adcf364061a8e5c1e26fb8e102caf69

    • SSDEEP

      768:Tf5Ui0Wh/Ndv7j7LF12NADhHl2ASeCYuD:+WNNdDJ0NahHMAS3D

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks