General

  • Target

    4a1417007cce3309e04b28f326953288_JaffaCakes118

  • Size

    3.8MB

  • Sample

    241015-z9npdsxgna

  • MD5

    4a1417007cce3309e04b28f326953288

  • SHA1

    577dee7298196e38cd0df9234970205b71288304

  • SHA256

    592fd5f007d203ca288a16161f53dc7ca7bcf84ef431b45c48e42d7d202c0ba9

  • SHA512

    93b577cd84b914cee8bd0a816ee9207ba48bcf98836bbd69fa9376375999f6238ce932fc248618bb0af9614effc7e321a6ffd426ec94bc5f5137dba992726bea

  • SSDEEP

    98304:eHEvO202+T2nchP/WNLTYnOFTk+KmJDAxRhEwlGlvNayFdP:UEvOfth/WFB6EPXXP

Malware Config

Targets

    • Target

      4a1417007cce3309e04b28f326953288_JaffaCakes118

    • Size

      3.8MB

    • MD5

      4a1417007cce3309e04b28f326953288

    • SHA1

      577dee7298196e38cd0df9234970205b71288304

    • SHA256

      592fd5f007d203ca288a16161f53dc7ca7bcf84ef431b45c48e42d7d202c0ba9

    • SHA512

      93b577cd84b914cee8bd0a816ee9207ba48bcf98836bbd69fa9376375999f6238ce932fc248618bb0af9614effc7e321a6ffd426ec94bc5f5137dba992726bea

    • SSDEEP

      98304:eHEvO202+T2nchP/WNLTYnOFTk+KmJDAxRhEwlGlvNayFdP:UEvOfth/WFB6EPXXP

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      lyhtgh.mn.ltplugin_v1023.pl

    • Size

      145KB

    • MD5

      278e8100ea1ee2c466d55451e87cef73

    • SHA1

      8347d2b269f74841ca92cef51d450ed953d73aaa

    • SHA256

      06d08532287fc6a934aba8d5a361eb83e4d7a1c8cde4f6663ab2746e4fc09a38

    • SHA512

      3e7fcf245a07ce8e03a78f75835c30e0b0f270e68987f85b92aa97f7b0894d73702ebdd80372cddea310a52624db1ccf65125399b6bf218dbd717ad053dec088

    • SSDEEP

      3072:oxUD4XoHRfdDehWRT3ZI2c9CvcLUswbaTqM2r1vjKIjCB94PXZ:h4oBda8TXc8v0UsjTQJjtCu

    Score
    1/10
    • Target

      unicom_resource.dat

    • Size

      41KB

    • MD5

      1099cc55782e9dfbea4df0cc9c42e8af

    • SHA1

      c398368af914bbc35187b15201ab9b10de3f0592

    • SHA256

      7ae180774a4f784d4ebc21650295cea6269d0c4a1884a5af815930ee47553279

    • SHA512

      e6dcdac4c51042db8a91f25cf9d1461c0b4284a5138086fb3264e7090840aa6ca144f18e7bc498d0ecd1d131804193d94bdf471e8ada15f7b30b2bb8359adef8

    • SSDEEP

      768:R8gYCYCpONOKIfwiFWAkEsDVop56mAOvuGMC21q0dkHj:9PRpO4KsOOvuG3+dkD

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks