Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    20-04-2024 23:19

General

  • Target

    fde218b2cd492b1127f4a403420cb415_JaffaCakes118.apk

  • Size

    286KB

  • MD5

    fde218b2cd492b1127f4a403420cb415

  • SHA1

    253c2a9491e991a0a6170bcbc70a573f72322e51

  • SHA256

    40fb45628c046597c82ec36744bbc41cfda5b132443d52ddd1747638a8d998aa

  • SHA512

    048109e8a2d3eb7b9f85c7c2951afd78a7447507472d46e3e2026b75ab0ccb0cb613ae71d0f142862bbe6b8aa4ff6d8f36eacb724eade007a1a7cc6cb8ca5f7f

  • SSDEEP

    6144:9ei08Im9OWhRShnW/nkV52xN9VjGPSVl2lEIYVJsIc+Lx:9e0Bhc2k6b9lGjuIYl1x

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • com.pyqs.zbik
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4426

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.pyqs.zbik/files/dex

    Filesize

    483KB

    MD5

    883ce13b46747645c156631f6ab6bb7e

    SHA1

    88eb3fd5df0d1e7223e3e16df10960783b65ff37

    SHA256

    9481fb88f9d67758f60815eb2117ae24ef38cb025488a7e6986e641c19d0721e

    SHA512

    01eecd9ff32e5079b35fa892af2663587ab6497abe3b3fb7fa77d281c9e5c11788b98c0e1162fd4c67f569a3dfe1fd4fe90be26910b607b892666bebe751a6b3