General

  • Target

    da116b881826e1c9098a04e818ada712_JaffaCakes118

  • Size

    2.5MB

  • Sample

    240911-lknq7stbjn

  • MD5

    da116b881826e1c9098a04e818ada712

  • SHA1

    9f7fb21b42822ca16078dd859ad23859021ff9cb

  • SHA256

    ad6a836478d50141493a84558fabad099b00fe34339f4655d49159869a5c3b18

  • SHA512

    082cce76dcea445e5ad960e572c2dffee54e0eeeb084461af2df919044edd3e1f79a2198aa1bbeb0d7025e2b370c13f73fb9e9e3900394efcaba955e218bb3e5

  • SSDEEP

    49152:2SjvR3nLWugfRU5ynOANpT07aqTVUXrLI2NIRGZ2GIpXK:XjvJLWu6RfnNw7dZUXrU2NIRGZ21XK

Malware Config

Targets

    • Target

      da116b881826e1c9098a04e818ada712_JaffaCakes118

    • Size

      2.5MB

    • MD5

      da116b881826e1c9098a04e818ada712

    • SHA1

      9f7fb21b42822ca16078dd859ad23859021ff9cb

    • SHA256

      ad6a836478d50141493a84558fabad099b00fe34339f4655d49159869a5c3b18

    • SHA512

      082cce76dcea445e5ad960e572c2dffee54e0eeeb084461af2df919044edd3e1f79a2198aa1bbeb0d7025e2b370c13f73fb9e9e3900394efcaba955e218bb3e5

    • SSDEEP

      49152:2SjvR3nLWugfRU5ynOANpT07aqTVUXrLI2NIRGZ2GIpXK:XjvJLWu6RfnNw7dZUXrU2NIRGZ21XK

    • BadMirror

      BadMirror is an Android infostealer first seen in March 2016.

    • BadMirror payload

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks