General
-
Target
da116b881826e1c9098a04e818ada712_JaffaCakes118
-
Size
2.5MB
-
Sample
240911-lknq7stbjn
-
MD5
da116b881826e1c9098a04e818ada712
-
SHA1
9f7fb21b42822ca16078dd859ad23859021ff9cb
-
SHA256
ad6a836478d50141493a84558fabad099b00fe34339f4655d49159869a5c3b18
-
SHA512
082cce76dcea445e5ad960e572c2dffee54e0eeeb084461af2df919044edd3e1f79a2198aa1bbeb0d7025e2b370c13f73fb9e9e3900394efcaba955e218bb3e5
-
SSDEEP
49152:2SjvR3nLWugfRU5ynOANpT07aqTVUXrLI2NIRGZ2GIpXK:XjvJLWu6RfnNw7dZUXrU2NIRGZ21XK
Static task
static1
Malware Config
Targets
-
-
Target
da116b881826e1c9098a04e818ada712_JaffaCakes118
-
Size
2.5MB
-
MD5
da116b881826e1c9098a04e818ada712
-
SHA1
9f7fb21b42822ca16078dd859ad23859021ff9cb
-
SHA256
ad6a836478d50141493a84558fabad099b00fe34339f4655d49159869a5c3b18
-
SHA512
082cce76dcea445e5ad960e572c2dffee54e0eeeb084461af2df919044edd3e1f79a2198aa1bbeb0d7025e2b370c13f73fb9e9e3900394efcaba955e218bb3e5
-
SSDEEP
49152:2SjvR3nLWugfRU5ynOANpT07aqTVUXrLI2NIRGZ2GIpXK:XjvJLWu6RfnNw7dZUXrU2NIRGZ21XK
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2