Analysis
-
max time kernel
14s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
20-04-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
fd24a353333290823f091b8009e14442_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
fd24a353333290823f091b8009e14442_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240229-en
General
-
Target
fd24a353333290823f091b8009e14442_JaffaCakes118.apk
-
Size
3.6MB
-
MD5
fd24a353333290823f091b8009e14442
-
SHA1
286dfdecb8fbc68edf97859b14a4e0c3c40dfee2
-
SHA256
abfd0c592a86e779c88151d4e4e4c6ec9d7ec29c39a902f3a2584a3c70390f75
-
SHA512
05e00a2dd441793a284ffe8adb9dbeef81971ee2a5e269bec5386110fc772ad0efe2f0f159bdc5d35dc4826b5bd85976ff4ddebbce456f4c98207effaa523316
-
SSDEEP
98304:RIhYqJ3fddrDdc9nNn4RreXSbfcGnWHpBwVbJszAewxegk:ihYqJ3lpm9Nn4VeXSodpBWb6wxegk
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.chzzxds.app/files/_RunDex_/ts.dex 4313 com.chzzxds.app /data/user/0/com.chzzxds.app/files/_RunDex_/ts.dex 4382 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.chzzxds.app/files/_RunDex_/ts.dex --output-vdex-fd=57 --oat-fd=61 --oat-location=/data/user/0/com.chzzxds.app/files/_RunDex_/oat/x86/ts.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.chzzxds.app/files/_RunDex_/ts.dex 4313 com.chzzxds.app -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.chzzxds.app
Processes
-
com.chzzxds.app1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4313 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.chzzxds.app/files/_RunDex_/ts.dex --output-vdex-fd=57 --oat-fd=61 --oat-location=/data/user/0/com.chzzxds.app/files/_RunDex_/oat/x86/ts.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4382
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5584c062fe1feb01e1e8d670b163a28ff
SHA1d84df0683c50d4913fdacaffda9be6422c315330
SHA2562125c3e259a2cbea3a97a11395fc6e4ba31e29a56db683da04c201a073a9232d
SHA512770a947879ad466455e75788f1919dda79cf2b90521701b8f558a6fc6f1f31f244cae04483f29a01049fbb048fadedbe23fe8810fe1ac827dc20abfc5e3a0307
-
Filesize
10B
MD590e39a6c93d30c20cab2c5fc9e6e617a
SHA185d647a98aac03e2141ae5da4bafe78b68e7a941
SHA2565fd545587db7718a20ac89adec36267bd83d3e074b00c277ce59d921b97fe8b5
SHA51297abf11f9b37fbb326189e1ffff68ba71170f6780b97ab2b57e6dc2796ba31e8056de07b3133774fcb88faf48b40052db3e449bb6a574f62dc0fac6bad55941a
-
Filesize
6KB
MD5e340ee019a685a7f2eb1ae7676c63ff5
SHA164675247397b3c40fabce6c2546f15c0365693a5
SHA25689011afca796309942fbb69b3155df063265196a062da9dd66d7a36c256f8b4d
SHA51209b4d1a48b597aaea0a4bc8bd0731c185715997a3bec213f61d45175b2ac493e1b689588308d33ccce8ca6025c47e3513b0fa761525b596e7964715511647a2e