Analysis
-
max time kernel
64s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
13/05/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
40518cd52f021c0f4e12bd54d848d473_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
40518cd52f021c0f4e12bd54d848d473_JaffaCakes118.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
40518cd52f021c0f4e12bd54d848d473_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
Behavioral task
behavioral4
Sample
KoTvGameBox.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral5
Sample
KoTvGameBox.apk
Resource
android-33-x64-arm64-20240508.1-en
General
-
Target
40518cd52f021c0f4e12bd54d848d473_JaffaCakes118.apk
-
Size
30.8MB
-
MD5
40518cd52f021c0f4e12bd54d848d473
-
SHA1
99baa305a6f5de98750574b41c79ed9b9dceeab7
-
SHA256
6ae77ad263d418e73d9cfd3f913af20c17f576ddecdad51ca0cd83bcd20c193b
-
SHA512
e16b958edd9dbc8754491cf0c8b7ba8bdc63fd7baeccfeb4148826fde9c4cafad2519769af0db120b2afe6b4df33907a60ccd3e446922b9dd406c0e96685c250
-
SSDEEP
786432:3oYQLfEORAkkeqHETmMEgsKcTs/AG9I4LsQAth8D5iOzH5oet0V:RmAkkVEaMEvKck/sQw6lD5oet2
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo cn.vszone.teenagemutant -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo cn.vszone.teenagemutant -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo cn.vszone.teenagemutant -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests dangerous framework permissions 6 IoCs
description ioc Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529B
MD5df14150d876b9f1ac4b606e7d1028f20
SHA1dcad6aaa778872211eec376c21a34f4d3dc992a6
SHA256201e2d72c1d2c4b48edec3624149a27af2a5078e518fa2a29daf78d7f60250ab
SHA5128d7849e56fe9da98b08dd849ccbe2066fd760c78476e4c326d96dc6e66f2dd0fdf8d535e7d2c51c4d21ddcebbe1ee9ea9e0b8b2ac4ca81526de9fc29363fa4da
-
Filesize
148B
MD5735f11ce6c5349b9b95ce53d7819058a
SHA1cccbcf6200375fe0bbaa8a10fea3a646e001fbeb
SHA2569f2dc091c000a7d7030e44abb019c3b3f40f5c56a440e0332eb02650d521c9fb
SHA512c49f0d034c1d18f60dad7eedf28b089b816778d38ccf515a6115a5eac8cfdc68ebdd8f177bbb792d12c3ed1c4848d78248767301807f16cebd9e26d10a4ca17e
-
Filesize
26.7MB
MD51230170068cf9378065c5ae68c18cdbd
SHA15bb423f8856be49f36f444dcc7ecbb43a10a259b
SHA2560cd6a9de6fa5c0c07c34bce7f6d70d3e07c952dfe739c00841c71dc16b3f4367
SHA512cc2df4d5a8d32574f614673302f1f2954819bf5de8efe7b8731627488a55740ef06fd4e133471b196776f62321d29e1d4041f0f015f83914ac845ae7d0aa14fb
-
Filesize
8.0MB
MD546416a84a4c7ab82acd5b1dc3ca52bed
SHA1b3fdaffd7ad3fe810fe3bbe983bd28f4b85e1b0a
SHA256a85bafbfc00df7169e9146a2075838bf3c5243107dbad5aadb2144277e5efee1
SHA5128a35c47189c0edae9c6d44f76c889ed33be958c5a5a5fe0f53f53e200b838eecc0b2a74251437a87d3c74b049c7fa3b83e21c9996e29ced0101e968caf192053