Analysis
-
max time kernel
3s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13/12/2024, 07:13
Behavioral task
behavioral1
Sample
ea82a73bbc6adf772a797d9d2968576a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
General
-
Target
ea82a73bbc6adf772a797d9d2968576a_JaffaCakes118.apk
-
Size
3.2MB
-
MD5
ea82a73bbc6adf772a797d9d2968576a
-
SHA1
28f9e3c4aeacd7285be6c42a5ebfa108f488fe83
-
SHA256
c9aa5ea26ac928323a236e7a060351a4d0ffce903eb6e317d6552dbf69c9acd8
-
SHA512
1c9461cfc437a492ed1ffe25a157f792b78a3604a995651c5cfd172ea8845ea116605800dc1706a1fac9a84e8f764aee299c0a39b0eeeb118b5f6b9b310ad6ca
-
SSDEEP
98304:RZnybtzJ8P36EpaYrRG/zztP0AKQT/ho1dNVOAL3mi9Fn6M:RZnybVJ3Gbrk/zztc9Mho1dTOAL3mzM
Malware Config
Signatures
-
BadMirror
BadMirror is an Android infostealer first seen in March 2016.
-
Badmirror family
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.qqsb.msttt -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qqsb.msttt -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.qqsb.msttt -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.qqsb.msttt -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.qqsb.msttt -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.qqsb.msttt
Processes
-
com.qqsb.msttt1⤵
- Requests cell location
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4252 -
sh2⤵PID:4352
-
-
dd if=/data/data/com.qqsb.msttt/lib/libhelper.so of=/data/data/com.qqsb.msttt/helper1⤵PID:4382
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5ff77b5d69b34041a8e08a6aba4eb1767
SHA11f78eca6afe441a5c059b58c98d7bafb3450177e
SHA25678607f7e8ec75e26163536369b8a14de47aa35609616dfd520229e056d596f77
SHA51209ed69804f14f75356ea2d4e57b7553f7df7cca1b182f9783da585ccb7209f7c0f8c35623a6fb0760779d32bd70301a7cf94d97b6274b58a35eb175ed5fec84c
-
Filesize
512B
MD5224d500ccefcf40613468b1e2e452cfd
SHA14c2a7152376a4262941b000c84ff8c71ae1f84f6
SHA256ceeb60cd966ec24a5fc138856ec5b57c603485e087f08a282401f964866ceedd
SHA5122e17f9e3cd1accbb636219d22045a7655449e42721dbfde1874bcf1758fb026154eea9a7cd09bc9eeaffcb5e53fc40cf2919334a8b863c0cec5c252dea2d985b
-
Filesize
40KB
MD591b49abc1b7605fb3cc13da00a87da8a
SHA1af03e5830f1c0d249b494e3d1f5e5d029aaacb11
SHA256ef0f29f45555b6dd943ec311183eec65b7819aa051b89b12cd4d2e1bcf846a68
SHA512bf5f8e9e00c946ce21561f22ffb4aebeb47ebed602f235e2ef7250b3bbe45fc0c10d4a2f384fcb09eac90939af9e39b54178fb3f92c25d9ac0d9c549d9e7eb20