General
-
Target
fc0ee1a62a0522617d4f52a8dd5f89c6_JaffaCakes118
-
Size
5.9MB
-
Sample
240928-l3kghasclh
-
MD5
fc0ee1a62a0522617d4f52a8dd5f89c6
-
SHA1
b61edc617f5bbfd6ac212d0283d1ab9715e2307d
-
SHA256
0c047b72ed4484e6a3691e97e7d35c4246a6c908ecd03fda854a6bc7ec2c1cd3
-
SHA512
8bf1465b7577d1921b0a6388ec97c74b4bfec3a54d74d4ce2f500c452a1f8cc595bfe6f60b0ab90b8a2eb779a3fbe67a4a11492009f3c46fcc4e06ad29825ffd
-
SSDEEP
98304:4Kg65R/7/mTywOZcAlBnkjmujaHEro6VnV5Dt61qRiYa3rG:vgUt25/Al56KMTnV5DtKqRi7G
Static task
static1
Malware Config
Targets
-
-
Target
fc0ee1a62a0522617d4f52a8dd5f89c6_JaffaCakes118
-
Size
5.9MB
-
MD5
fc0ee1a62a0522617d4f52a8dd5f89c6
-
SHA1
b61edc617f5bbfd6ac212d0283d1ab9715e2307d
-
SHA256
0c047b72ed4484e6a3691e97e7d35c4246a6c908ecd03fda854a6bc7ec2c1cd3
-
SHA512
8bf1465b7577d1921b0a6388ec97c74b4bfec3a54d74d4ce2f500c452a1f8cc595bfe6f60b0ab90b8a2eb779a3fbe67a4a11492009f3c46fcc4e06ad29825ffd
-
SSDEEP
98304:4Kg65R/7/mTywOZcAlBnkjmujaHEro6VnV5Dt61qRiYa3rG:vgUt25/Al56KMTnV5DtKqRi7G
-
BadMirror payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-