General

  • Target

    4f7d59ef27852b2e649d5472377bcf6f_JaffaCakes118

  • Size

    14.3MB

  • Sample

    241016-2y95csxhkd

  • MD5

    4f7d59ef27852b2e649d5472377bcf6f

  • SHA1

    aa52ef3175466e3ff872475625ad9a6671af9bf6

  • SHA256

    c5eb6ecb15e314e6516d8575ce75d2b59e63558b677cd2191332e33f04651ca5

  • SHA512

    f6b106af3524391b5c3e432d7475cb8110269a15ea3613d004b826a464b2fe5cb71da0e796dd2075362be4fd9a3057b323145d9cc7bfc5ba9788a23c007f1dce

  • SSDEEP

    393216:CQ3SoIJF9nu9LAYFzVhgaxEMM3qTNYoURpZ5donKWcNZY8T:CR7j4zHgJ7r35oMlT

Malware Config

Targets

    • Target

      4f7d59ef27852b2e649d5472377bcf6f_JaffaCakes118

    • Size

      14.3MB

    • MD5

      4f7d59ef27852b2e649d5472377bcf6f

    • SHA1

      aa52ef3175466e3ff872475625ad9a6671af9bf6

    • SHA256

      c5eb6ecb15e314e6516d8575ce75d2b59e63558b677cd2191332e33f04651ca5

    • SHA512

      f6b106af3524391b5c3e432d7475cb8110269a15ea3613d004b826a464b2fe5cb71da0e796dd2075362be4fd9a3057b323145d9cc7bfc5ba9788a23c007f1dce

    • SSDEEP

      393216:CQ3SoIJF9nu9LAYFzVhgaxEMM3qTNYoURpZ5donKWcNZY8T:CR7j4zHgJ7r35oMlT

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks