General
-
Target
c97087d09a2871d855dc86bf0a41d4f0_JaffaCakes118
-
Size
2.9MB
-
Sample
240829-xqqzasybmq
-
MD5
c97087d09a2871d855dc86bf0a41d4f0
-
SHA1
e6c1735b3497de38378bd85e38922a6462edd023
-
SHA256
008b603811de18b5cedfa27a3635b9d63c450282003a2f0fece324d73b11193b
-
SHA512
fd853bc5444d28ee889fcfb6fefcc38cafa3065f8888fff3c407cbb3956be5bb185fec8604890b0fd31a3d90e0ba22e8c8e155acec3c809d21a7f482f5809cfc
-
SSDEEP
49152:1Zn1XxvfGXBIn7OyC6pnXWQ+v7HDNY+qKvb1gJjLqo1ZxMaQg6XgX4YX:1Z1hHGXBIn7mcv8LRp3D1sPqoHvrX
Static task
static1
Malware Config
Targets
-
-
Target
c97087d09a2871d855dc86bf0a41d4f0_JaffaCakes118
-
Size
2.9MB
-
MD5
c97087d09a2871d855dc86bf0a41d4f0
-
SHA1
e6c1735b3497de38378bd85e38922a6462edd023
-
SHA256
008b603811de18b5cedfa27a3635b9d63c450282003a2f0fece324d73b11193b
-
SHA512
fd853bc5444d28ee889fcfb6fefcc38cafa3065f8888fff3c407cbb3956be5bb185fec8604890b0fd31a3d90e0ba22e8c8e155acec3c809d21a7f482f5809cfc
-
SSDEEP
49152:1Zn1XxvfGXBIn7OyC6pnXWQ+v7HDNY+qKvb1gJjLqo1ZxMaQg6XgX4YX:1Z1hHGXBIn7mcv8LRp3D1sPqoHvrX
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2