General
-
Target
39410d8a3ab01d60bf7f81c5e0e63e21_JaffaCakes118
-
Size
4.4MB
-
Sample
240729-fsy91sydnb
-
MD5
39410d8a3ab01d60bf7f81c5e0e63e21
-
SHA1
b8db6a4fa38f3523d60e694975bb4f014ba9dba5
-
SHA256
091e46379e6ad6c7c941e362f80b0882d548da4c7b3f29e9cf6c44d520b07b71
-
SHA512
fe5cba77aafdd19587d89d2d1d9690f81b1a175b4c2e45641e6ff69ea07c6fc9ed26b8a14168de017e84187004db295a8f2295647744092ffe5b778eb34bca4d
-
SSDEEP
98304:0T2UUo6nzvoF1SruG3SKaQmPEm/vM70fyBprY+4ofhTxt:U2Uf6zg+rbJHm/UvroOT7
Static task
static1
Malware Config
Targets
-
-
Target
39410d8a3ab01d60bf7f81c5e0e63e21_JaffaCakes118
-
Size
4.4MB
-
MD5
39410d8a3ab01d60bf7f81c5e0e63e21
-
SHA1
b8db6a4fa38f3523d60e694975bb4f014ba9dba5
-
SHA256
091e46379e6ad6c7c941e362f80b0882d548da4c7b3f29e9cf6c44d520b07b71
-
SHA512
fe5cba77aafdd19587d89d2d1d9690f81b1a175b4c2e45641e6ff69ea07c6fc9ed26b8a14168de017e84187004db295a8f2295647744092ffe5b778eb34bca4d
-
SSDEEP
98304:0T2UUo6nzvoF1SruG3SKaQmPEm/vM70fyBprY+4ofhTxt:U2Uf6zg+rbJHm/UvroOT7
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2