General
-
Target
9c57896cde03bd25baf2178d085bf727_JaffaCakes118
-
Size
2.8MB
-
Sample
240610-3r7w4awdjl
-
MD5
9c57896cde03bd25baf2178d085bf727
-
SHA1
3d53cc4ac72922e04a0df9706837705b41067073
-
SHA256
34775afd06a2a44335b123ccedb31e44b7db08f30fe3a0c3fee9b92a781e16f5
-
SHA512
6f443145d7b0d8d6c29c34f9be6cadf3a46cdf8219a3db806b42a5380c80bf28f6f8829a342f5e97d4abf0e41eee31305e6e7d1d3873bd11abe08911f270c71d
-
SSDEEP
49152:Ctnh2Dewgy6NosLPFlcrv4P/xEmreTUtBNJ0/EdHjEvX1JDN0LxpHZqgF7T69t/:ChgtGZDcrgRnrE/MuyDHZ4j/
Static task
static1
Behavioral task
behavioral1
Sample
9c57896cde03bd25baf2178d085bf727_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9c57896cde03bd25baf2178d085bf727_JaffaCakes118
-
Size
2.8MB
-
MD5
9c57896cde03bd25baf2178d085bf727
-
SHA1
3d53cc4ac72922e04a0df9706837705b41067073
-
SHA256
34775afd06a2a44335b123ccedb31e44b7db08f30fe3a0c3fee9b92a781e16f5
-
SHA512
6f443145d7b0d8d6c29c34f9be6cadf3a46cdf8219a3db806b42a5380c80bf28f6f8829a342f5e97d4abf0e41eee31305e6e7d1d3873bd11abe08911f270c71d
-
SSDEEP
49152:Ctnh2Dewgy6NosLPFlcrv4P/xEmreTUtBNJ0/EdHjEvX1JDN0LxpHZqgF7T69t/:ChgtGZDcrgRnrE/MuyDHZ4j/
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2