Analysis
-
max time kernel
1s -
max time network
145s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
03/12/2024, 22:17
Behavioral task
behavioral1
Sample
bf7b9a03b5effc03d886f195465ecc23_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
General
-
Target
bf7b9a03b5effc03d886f195465ecc23_JaffaCakes118.apk
-
Size
5.9MB
-
MD5
bf7b9a03b5effc03d886f195465ecc23
-
SHA1
99bf70d2f956bc8aba9eeedc4c1746e795ad0281
-
SHA256
f8145d3e3527f59b9b5404c3e5846356e38b08cc6b05abc306a4eb7fb1550e59
-
SHA512
ac7ac89d5d5fafad7c8efbb14d30afa40bc066f0cc69c70f6b9fb80c01d3ceb76a96a8dfbe225bb493e181aeaa4b192bfa42c447ae852028a410bcdbc08dcdaf
-
SSDEEP
98304:BsDfkYFar65JbF7ge537BGR2/yKLIxKgTMp4LhOSJ+HozK7umfQzlE988ztTuUDf:BsA0I491MxKgTMGmozhIry8ztTuxS
Malware Config
Signatures
-
BadMirror
BadMirror is an Android infostealer first seen in March 2016.
-
Badmirror family
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses org.funcity.runrunner -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ org.funcity.runrunner -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation org.funcity.runrunner -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo org.funcity.runrunner -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo org.funcity.runrunner -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone org.funcity.runrunner -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener org.funcity.runrunner -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver org.funcity.runrunner -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo org.funcity.runrunner -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo org.funcity.runrunner
Processes
-
org.funcity.runrunner1⤵
- Queries information about running processes on the device
- Reads the content of the SMS messages.
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4375
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c62f19fa18afe997f57249b0697aafbf
SHA1fcc2424202a608371c09bdab1c308ae3f8ee15e3
SHA2561c063c174c8aa9dbdf7787931028ab5d55dfccf26b2167de759a73344ed895e1
SHA512d4cf9bea7914c5517ee795e91cba7891ebbad428b3aef617071ee82442b0cf44901073492d7df0b7c1d431d44352e0c6adf47f55d7ae3ac1c4725e0dc2182562
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5acfad7d955485faa4900db07c4197ba7
SHA1ff5a753d9701276c706fcfb27628ca7c8e73b616
SHA2564cad7c48c4632731b0adf5ae39acc8f5d46e4f2946f5b92d3809edf32cb2bec4
SHA5127031d3b8b9fa3071fe174d465d011cdf81e66fe56b3961c6aa4c3c7c3879c88a764920b5912f4976d3da294df8f3fa4b51f54b20880eb16c42d1f819807ba220
-
Filesize
40KB
MD59012fa79bd929bea4f97a0a6ce4e0fd5
SHA11e7a06815c3bdf5ce2c1b9bbc96275c6aed69dff
SHA25646e645a4100641ac4cdc6403f40317216467fb5d9426af08d5ee3e2570d517d8
SHA5121e113b39a7e8785f3df262a7a5f5d64a4b212fffeaf66ac6e6dce561a96e3d68f7ce4ef06f8334ff43e39c876a5ea13bc3524ce68d71802e861da67f0048b4a3