General
-
Target
bb4790ddac87e287d7bb582cc11e6e47_JaffaCakes118
-
Size
4.7MB
-
Sample
240618-lqjz7sxhqa
-
MD5
bb4790ddac87e287d7bb582cc11e6e47
-
SHA1
c6b4bfd8d9a3d338a5f048501a16d63a57a23482
-
SHA256
90309072bbda7a6f6a991e7644b97aaf3759224da09a306462d5909ab84f0366
-
SHA512
fb23ad30c1bdbbb68c8d8b37086b5790f71e75f094f0dbfa007fbc170608c13500b54021ce96dedebf654710520723442713d7d39e2f5274f9a1f28c8c5aa6e9
-
SSDEEP
98304:jRkRaHaREBsxNmvrnfjbrc3fcbqdHt/2XGs6FSpeR8v8PZ2LTizki5:1k4uEBsCvrvY3x2mL8EPoLTiYM
Static task
static1
Malware Config
Targets
-
-
Target
bb4790ddac87e287d7bb582cc11e6e47_JaffaCakes118
-
Size
4.7MB
-
MD5
bb4790ddac87e287d7bb582cc11e6e47
-
SHA1
c6b4bfd8d9a3d338a5f048501a16d63a57a23482
-
SHA256
90309072bbda7a6f6a991e7644b97aaf3759224da09a306462d5909ab84f0366
-
SHA512
fb23ad30c1bdbbb68c8d8b37086b5790f71e75f094f0dbfa007fbc170608c13500b54021ce96dedebf654710520723442713d7d39e2f5274f9a1f28c8c5aa6e9
-
SSDEEP
98304:jRkRaHaREBsxNmvrnfjbrc3fcbqdHt/2XGs6FSpeR8v8PZ2LTizki5:1k4uEBsCvrvY3x2mL8EPoLTiYM
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-