General
-
Target
dcbe8909eb8a93aa58c61f895e90231b_JaffaCakes118
-
Size
4.0MB
-
Sample
240912-wege2swdrl
-
MD5
dcbe8909eb8a93aa58c61f895e90231b
-
SHA1
440d12b7c9b17561341edf632946265f56614c0b
-
SHA256
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
SHA512
7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330
-
SSDEEP
98304:f3MmmTh4BL7rhBJRu9B+B0xfubCavVQram5/6zswquACYuzQJWd:kmq4p7NscB02CavVQraK/nwqnMr
Static task
static1
Behavioral task
behavioral1
Sample
dcbe8909eb8a93aa58c61f895e90231b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
dcbe8909eb8a93aa58c61f895e90231b_JaffaCakes118
-
Size
4.0MB
-
MD5
dcbe8909eb8a93aa58c61f895e90231b
-
SHA1
440d12b7c9b17561341edf632946265f56614c0b
-
SHA256
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
SHA512
7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330
-
SSDEEP
98304:f3MmmTh4BL7rhBJRu9B+B0xfubCavVQram5/6zswquACYuzQJWd:kmq4p7NscB02CavVQraK/nwqnMr
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2