General

  • Target

    c97087d09a2871d855dc86bf0a41d4f0_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240829-xqqzasybmq

  • MD5

    c97087d09a2871d855dc86bf0a41d4f0

  • SHA1

    e6c1735b3497de38378bd85e38922a6462edd023

  • SHA256

    008b603811de18b5cedfa27a3635b9d63c450282003a2f0fece324d73b11193b

  • SHA512

    fd853bc5444d28ee889fcfb6fefcc38cafa3065f8888fff3c407cbb3956be5bb185fec8604890b0fd31a3d90e0ba22e8c8e155acec3c809d21a7f482f5809cfc

  • SSDEEP

    49152:1Zn1XxvfGXBIn7OyC6pnXWQ+v7HDNY+qKvb1gJjLqo1ZxMaQg6XgX4YX:1Z1hHGXBIn7mcv8LRp3D1sPqoHvrX

Malware Config

Targets

    • Target

      c97087d09a2871d855dc86bf0a41d4f0_JaffaCakes118

    • Size

      2.9MB

    • MD5

      c97087d09a2871d855dc86bf0a41d4f0

    • SHA1

      e6c1735b3497de38378bd85e38922a6462edd023

    • SHA256

      008b603811de18b5cedfa27a3635b9d63c450282003a2f0fece324d73b11193b

    • SHA512

      fd853bc5444d28ee889fcfb6fefcc38cafa3065f8888fff3c407cbb3956be5bb185fec8604890b0fd31a3d90e0ba22e8c8e155acec3c809d21a7f482f5809cfc

    • SSDEEP

      49152:1Zn1XxvfGXBIn7OyC6pnXWQ+v7HDNY+qKvb1gJjLqo1ZxMaQg6XgX4YX:1Z1hHGXBIn7mcv8LRp3D1sPqoHvrX

    • BadMirror

      BadMirror is an Android infostealer first seen in March 2016.

    • BadMirror payload

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks