Analysis
-
max time kernel
150s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240506-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system -
submitted
10/05/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
2eead97aac36b390bc83715d7f68200a_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
2eead97aac36b390bc83715d7f68200a_JaffaCakes118.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
2eead97aac36b390bc83715d7f68200a_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
2eead97aac36b390bc83715d7f68200a_JaffaCakes118.apk
-
Size
602KB
-
MD5
2eead97aac36b390bc83715d7f68200a
-
SHA1
5505f3396d3b443a426ce4e85f67fb742d4b76ea
-
SHA256
643f95a8a9c9653e3ef58ebd331e3e7d1ef711440e21a507624d7f9a2891f0bd
-
SHA512
da6e53caebb24fa7aeb2b0bc29c1b6e5303079eff7abc77fff8fb1f2c3b79a4a0b8b974eed472cdef0be514c7b6408715e2019f1321e01729a4b16551790d111
-
SSDEEP
12288:EEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BY+0aTBpqSol2KpElpX79b:EEaFmFN9v46flH72wOSoMKA9b
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
pid Process 4839 feifei.shasha13.meta.face -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo feifei.shasha13.meta.face -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo feifei.shasha13.meta.face -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/feifei.shasha13.meta.face/app_ttmp/t.jar 4839 feifei.shasha13.meta.face -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener feifei.shasha13.meta.face -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo feifei.shasha13.meta.face -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal feifei.shasha13.meta.face
Processes
-
feifei.shasha13.meta.face1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4839
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5e8a57a0de7a350d03e53bdbf2a7eb7df
SHA1f3e63fe750b9f9c2c04149aec942d34c68cd90de
SHA256e695a37aedd087884d5a7fb98697ac8982d855ffd7e6d4024ec8ae9ce931eef5
SHA51224f16004deedda78e2720c85871d55c07320345d74d8863405f012d3bac0bb43b4fa530fe072f8020886c16be2316fca04c59d589f89174a038c17ddd7c3ad13
-
Filesize
276KB
MD59aaea567e0c93e51718ba7eade0e83df
SHA10005116aad1779361b70093db00fed5ac090ae23
SHA256b30a95dff6f65f444472971c8aaf895ffc8e66e0117ce242ec4cb8a8a519a5ec
SHA5122aef1034335d8752f4e25ce6c5823ce03019536cc6e51ee61b5291c77a0f356a2517e0cbe7f2c4cc2d897115dc856449a342cfdc247c9d34d313187d15b2f890
-
Filesize
587KB
MD5f72c3d07507c3e26d317e9117ba757d1
SHA1cdede4739e9dd9fd95243aab5e44c24f93f825c3
SHA2561c65834d9ca018c6496a8b9957589d0e94657911b6635dc21a448d78f9238887
SHA5123420714252e7503abc13c99274d767b0bc08671d769460dc61823ab9470e145fb75c5dfaadc617d3a05cf251ed5ecf38ea7e8c1d7b343bca4d7e8296f1b805d4
-
Filesize
72KB
MD5c2f0a6183833cf8b44a273e8198eecb3
SHA1dddf6daf6704e5f18103060c0d953a1020699822
SHA25656bc9676b9697d9484aad71c49310c782bae855e20c11b65dbb89a0b23ab76c0
SHA5129a9dcc1626ecfb177878a98d720c260715afad2e627e4370d9cab1b70d9ade22747c15d33191df549a4d96e1aa7268543bff667ff0bd0f71790d81b59e1ff634
-
Filesize
512B
MD5eb6bdfb3bc04af8220670719faab4c79
SHA1b5e346732d1b73edb9951e5ef94bc281622b81de
SHA256fab22bdf33637069fb4ee63d651c76f840b7b20b77c4822219744cbd1cfa73c0
SHA51268103c85045be8ffaf4b8c4a156d6458c4aa8face87f6621904da8af8b29276131fcb4c22e0bcde5b584b64a0ab23803462f74c01c0066770c9784d90a8f892f
-
Filesize
8KB
MD5afebb0a0e11876caaee0f027082cc028
SHA1d0e77b6b8ead9f11b1ad3bfd89437787daeb4003
SHA256da91c3d99b1fd46ee652a13812d14fe2af468e8ebaee4170b7e6a080ab955ff3
SHA512359b47a3aca8543c4b8ff4fd01ad39f7a2b42799043c3d3cc14a1983bd53c91fc5e1cd9e00183a4962c63aba5f3b6075e71eff2454eb1df5132837d0851cea6c
-
Filesize
8KB
MD5463d5cff82309abf5f30b94f0356cab6
SHA12b584d0e27d28b8bf0d777e4760330705ad3bc79
SHA2560a0a517161235279a8bb815c5b3d4a06e67d55747f4a0385c95b7055deea6a0a
SHA5124ee58887e3b69ae3f10510280d99a7de1ba3b0640ecb40da523c8040ebe595360f9a45f2729189fc53ecae506c9496570f64f7ba35b4ead6c67b529250a16e5a
-
Filesize
12KB
MD5b032e05c9fcb6c677377751e06b7edc5
SHA110b3c5629f86c30f6c97f862366ae203f212d4c0
SHA256a2ee83966db97066819e7e0c41949e736340a9cbe53bbf0f1d4a25ba9af7a0e8
SHA51208d096d894ca7778cd202a5f757f13a02908465fbbb9b060cd22f4aaf5f18c30210014e644027fe858f7c58977967734de899a86ffa2d6e810a4eacdf93810a6