Analysis
-
max time kernel
150s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
20/04/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
fd001205ceaa9277c4b190eb8e1dc61a_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
MiGameCenterSDKService.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
MiGameCenterSDKService.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
MiGameCenterSDKService.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
unicom_resource.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral6
Sample
unicom_resource.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral7
Sample
unicom_resource.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
fd001205ceaa9277c4b190eb8e1dc61a_JaffaCakes118.apk
-
Size
7.9MB
-
MD5
fd001205ceaa9277c4b190eb8e1dc61a
-
SHA1
42bc401aec16487e8b446559ab99eb2b445bab39
-
SHA256
75450ff154f92308ff88f9c718ba2c77ddc59b4a3a7a34472b5d2166bfef9836
-
SHA512
707b395f568e5bd528f544ec401956be11bf3deff853be75e406571c01a85a68f6bc678d1a26b0fa4cb48b946fbb8c1e6f67b74da32e229d5b99b4dd05e40e63
-
SSDEEP
196608:KIlYOC2EQNuGjTOjg8hMQ9rs3fCVgBM+LWP2WYZd16:ZlC2EQNzjTMhcCVgu+LS2jZa
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks Android system properties for emulator presence. 1 TTPs 2 IoCs
description ioc Process Accessed system property key: ro.product.device com.mdong.zs.mi Accessed system property key: ro.product.model com.mdong.zs.mi -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.mdong.zs.mi -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.mdong.zs.mi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mdong.zs.mi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mdong.zs.mi -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mdong.zs.mi -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mdong.zs.mi -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mdong.zs.mi
Processes
-
com.mdong.zs.mi1⤵
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4288 -
/system/bin/sh -c getprop2⤵PID:4395
-
-
getprop2⤵PID:4395
-
-
/system/bin/sh -c type su2⤵PID:4423
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
224B
MD537fe68fee2ba76835dc6c50fc8d60ef1
SHA198b347bbc2c3f5694644f08a48ed037e33c2bad0
SHA2565520ed73c8b0b85495f06c376f1fb6b1a24426ecd1410026bf62bcfc06a0956a
SHA5129a9626687bb03f81481e696f54684a8418a7ab960378af2d963a5ca380ee7ebea90ee6cb6b2a90052da2797a1a9eec71935fec59ae3c4120a59ded279607bea2
-
Filesize
512B
MD553229d689945b5af40fee7f645af8fe2
SHA115b3ab6ed37837601e46cfaac17f498059e95b3e
SHA2567660af2cc01b1ec13531c6f5e4b897b6a18ecd3c46e50f5645f4ed8dd0aba621
SHA5121c460f898970e506d6e64990ed057e10b059b250d043ecf3f4532524aaffbec400383d03c95e74908cd1c290005596caab3658d7aed974e3abb679f9c128d070
-
Filesize
76KB
MD5694e213a2ee2b1d3bc5fc50959419a8a
SHA10432a9701378a16f8577a7623b2d16ee9c44e1b2
SHA2565517b1360b70921e94283c1f545506c9e3d3e8c5dbd59bf89d4c2ec22837db7c
SHA512aa716557a5ec5970e5c4c8ffe2cd614a9bde5f8e4db7d68149a46cfb0daa9a6bfa35d294f91a964bf8aba9a529f9b29b969708b97e2f34a2704495792f960050
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD556cd69f26f56575fee5cc111dad84584
SHA1f165e7258c5208e2d30346e6046fbbbe02538ece
SHA256aa8a654054af7342feabfbdc61a675edc1db62e064f3879471f2b99911b642bf
SHA512a1f10497ffbd2b959ba884372c527c43c58f4e184d6317eb849e38efff1a2437300149d3bf74cce89335d9200b38f80278e922e6f88b8fa0a8bbaed8debb3be5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5a7dcd47bf6de01e046702d190ad96131
SHA18330818317c1f46b502085362ff0cda947667d13
SHA2563244fed82f58b357266292b93439895741a672e76818d30bc32468c59591a590
SHA512e0c9dd94f38137c98dcdf3f99e4b5427438e642f3f71729cabab821e1b169e3891ffe37828afd01643cac55d0ca5ff34b765cabe2cc287f64a6502005ccc3c4d
-
Filesize
48B
MD5340611b379e362128c71623c5e8da1b4
SHA10673cee3ec93948c5474f182f9bc0bf0dbc0076e
SHA256ecbb19ea2633933cda78f7ff1d954581fb582f04a4ef3104c28b20c9afe65f69
SHA5127f6aa02295b963c4f3b1f93118e5a5230d163b54faafd0efb2ce3d5a8af9f1d8327f612013332388a6e10fb851496e147e300acc4f8d79389ffbb04ca2dd7555
-
Filesize
3KB
MD581af416be986c4947379c925d4fd02cf
SHA1568c816eb98c1f121413d0fcfdcbc9e689d5e5ee
SHA256f3f0710f8be1cc81098df40f667e9b65077cf2f0447cd241ad5d75c2605d2d9b
SHA512a053341456df0eb57817bbc0aae3d6215db4b12183d7c4b7cc094cf8421d8a76e5c016bd291394ee6a281ffbb53561c976acbc5c0a65ed46c8f8933fc73ac3fb
-
Filesize
65B
MD5cdf5f9b99e67c27ac5269b89170a2b27
SHA1bb0639bcd45b70eea6e73afc6843ddd9b1ae9e46
SHA256a5de6e4f708386f30b9872b806d4984e0931a73b061fc074ea3de87233d81fef
SHA5128cfd6e2ad9f5de25d707624180018c8939c8bb5f70368dfaf3f51c095a7ac9e9db6bf09f1837fa453ca08f56bbbd6a4fc52e148cf9660d2baf0969dfc46d55ad
-
Filesize
162B
MD59a1d9f1c61e56920acd712155cbee9f7
SHA12e66601319e7a3231c0b1b355bfb02c77db8812a
SHA256e5dc67afd4a96f9f3d53fa17e8bf67bbbb7579bb961fee35c2da52b252c1ce32
SHA51263f652e96b7544a35337db21b7dc9d012e4a3a757b525f721fb566540e90f8535dca2953763059582fb5d764800bba208688a3a9d5b22b5aacf74016bda50ce7