General
-
Target
f56c840d86aca1c68408584582fe6663_JaffaCakes118
-
Size
5.6MB
-
Sample
240925-hhpzpstekf
-
MD5
f56c840d86aca1c68408584582fe6663
-
SHA1
2a2b4c60c779bd330b29627c4ecbf98f53cc79e7
-
SHA256
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
SHA512
216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2
-
SSDEEP
98304:8d/DID//aI0iBCfdnWCS8DXPRmBeqDf2Sfx56+m4QIO0aQ0iCiqR0oCpQ2uX:c/A/7ckCbLPRXsvhgbQ0iCi3q2uX
Static task
static1
Behavioral task
behavioral1
Sample
f56c840d86aca1c68408584582fe6663_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
f56c840d86aca1c68408584582fe6663_JaffaCakes118
-
Size
5.6MB
-
MD5
f56c840d86aca1c68408584582fe6663
-
SHA1
2a2b4c60c779bd330b29627c4ecbf98f53cc79e7
-
SHA256
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
SHA512
216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2
-
SSDEEP
98304:8d/DID//aI0iBCfdnWCS8DXPRmBeqDf2Sfx56+m4QIO0aQ0iCiqR0oCpQ2uX:c/A/7ckCbLPRXsvhgbQ0iCi3q2uX
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2