General

  • Target

    4eb466ffd7064a52c7022c67be3af8fb_JaffaCakes118

  • Size

    4.4MB

  • Sample

    241016-ykbsvsygld

  • MD5

    4eb466ffd7064a52c7022c67be3af8fb

  • SHA1

    5f75c46d7f3b0a069bbec46a1cf167d104703284

  • SHA256

    3f8408b808b6f5f4153b6947e857637c258ff3dbad7c75b26716e87de831b7ed

  • SHA512

    a39afe732ec1fcc92f49d143aa9bf3432bf6c66084aa3f3a622a8f1c2c285fa30dc5b23c883c58750ad28256f271f94d3ac53b68153f09dc4d1686d6c53ddfb4

  • SSDEEP

    98304:gJfR65T+E/jVr/p4eT9H/q/dK04ljZEx9muMN+tpU:GR65F/B/9fqFb45qkN+jU

Malware Config

Targets

    • Target

      4eb466ffd7064a52c7022c67be3af8fb_JaffaCakes118

    • Size

      4.4MB

    • MD5

      4eb466ffd7064a52c7022c67be3af8fb

    • SHA1

      5f75c46d7f3b0a069bbec46a1cf167d104703284

    • SHA256

      3f8408b808b6f5f4153b6947e857637c258ff3dbad7c75b26716e87de831b7ed

    • SHA512

      a39afe732ec1fcc92f49d143aa9bf3432bf6c66084aa3f3a622a8f1c2c285fa30dc5b23c883c58750ad28256f271f94d3ac53b68153f09dc4d1686d6c53ddfb4

    • SSDEEP

      98304:gJfR65T+E/jVr/p4eT9H/q/dK04ljZEx9muMN+tpU:GR65F/B/9fqFb45qkN+jU

    • BadMirror

      BadMirror is an Android infostealer first seen in March 2016.

    • Checks Android system properties for emulator presence.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks