Analysis
-
max time kernel
9s -
max time network
127s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
01/05/2024, 15:22
Static task
static1
General
-
Target
0c23e56b8d2c74a7e69d32b702564cac_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
0c23e56b8d2c74a7e69d32b702564cac
-
SHA1
c8f86bbd26086292b3b1570bcd16d02cb8e40b64
-
SHA256
8bc5aa6069591a64d6c33fe8701db0174808db0fbd4f18ab7167f84e4e9010c6
-
SHA512
9f87e325ca32522eb5499d9bd34365d26c03f394ce1e86bd3f9597715f33f1ccb78406fd147b3982664abf8c685fa37ca39794b786a4f7d98dce978b961596ec
-
SSDEEP
49152:8irFrn1kion1XwrWqlGjcsYDptOQmT12MYZmY94:N9n1khgrWq0jlYDpgQm7g4
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.rxm.yyiszm/files/less/OBviXtim.jar 4318 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rxm.yyiszm/files/less/OBviXtim.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.rxm.yyiszm/files/less/oat/x86/OBviXtim.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.rxm.yyiszm/files/less/OBviXtim.jar 4284 com.rxm.yyiszm -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.rxm.yyiszm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.rxm.yyiszm
Processes
-
com.rxm.yyiszm1⤵
- Loads dropped Dex/Jar
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4284 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rxm.yyiszm/files/less/OBviXtim.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.rxm.yyiszm/files/less/oat/x86/OBviXtim.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4318
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD54f66dac45b4d8b5d7ebb14729b5e3f37
SHA176388eb70f26628c987579daf44d6efab3215c91
SHA256876fd958d9f9c6b6befabca2493fe06f830a160fff095bccd478141b14ff644d
SHA512dd396400ccec2be9b239d84d9bb6a28449257bc7198958dbd3faf6f9026a4ca094744b2722d8cc3751f99e52ee0ed1c66fff0dbded404276fe21e84bcce31ef4
-
Filesize
2.9MB
MD59dd06fa132f4c31605776e7889df91a3
SHA1c9a5ac001fb1d553492eae18c9f6c9c85464a143
SHA2567da8cf9c8d707d20223ea45a304ed9833956592a949b704318932ed9fbcbe665
SHA512142add63093ce2c40236bf6132e15581d456d79d0903c1213a20a125979fc7f62d0df4dc1de75412c1d8c6419fd8f508a06e9c2e43d915cc8d37e562e3dcff3f
-
Filesize
2.9MB
MD55d9aa2b3757c19de41687e710bf75da9
SHA1898004702420c5ee65e81360997bfd361ab5682e
SHA256a99f45c2732a7c907586f35745bf9ab1211b227c1d81b0a17b4ee8b3593426fd
SHA51244530d5d1fd229566f01ff933871f3ae7fd254d92f81b8df4b9312743df42bd1fa4daa61e6e082f16a0a808d56ee04949c210e8ce10c6dd0e206c05018346e10