Analysis
-
max time kernel
5s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
14/05/2024, 02:11
Behavioral task
behavioral1
Sample
3d812f2347769dfd107848153c7a1377_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
General
-
Target
3d812f2347769dfd107848153c7a1377_JaffaCakes118.apk
-
Size
5.6MB
-
MD5
3d812f2347769dfd107848153c7a1377
-
SHA1
6c76c0d5a7db5d3dfaa9eb05f364b31d47610e63
-
SHA256
f5c5fee10ceee52030e0216f68b83e46970b0f0071f1067cca48dfe2960dcec4
-
SHA512
f6e3103fe1162f709bd2186c1f38fdd6c9a2a1fcf1234e8fba6979407a2fe1c1cd0c21eb9b3b4c0fc42ef3db6316086c1014c5a4d37447d44cb09db8dc62d6e1
-
SSDEEP
98304:sMspe9iF8Gghf6Y1YW7jnnVBhDokAZgAFCN63RQWeW7QzlNmNha1zXB13eUd2SMc:Cii+LpnnVbwZDcNQRQ7Wcz3wCEgiDA
Malware Config
Signatures
-
BadMirror
BadMirror is an Android infostealer first seen in March 2016.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.klt.game.yjcq.dw -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.klt.game.yjcq.dw -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.klt.game.yjcq.dw -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.klt.game.yjcq.dw -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.klt.game.yjcq.dw -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.klt.game.yjcq.dw -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.klt.game.yjcq.dw -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.klt.game.yjcq.dw -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.klt.game.yjcq.dw
Processes
-
com.klt.game.yjcq.dw1⤵
- Requests cell location
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Reads the content of SMS inbox messages.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4268 -
sh2⤵PID:4379
-
-
dd if=/data/data/com.klt.game.yjcq.dw/lib/libhelper.so of=/data/data/com.klt.game.yjcq.dw/helper1⤵PID:4414
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5ff77b5d69b34041a8e08a6aba4eb1767
SHA11f78eca6afe441a5c059b58c98d7bafb3450177e
SHA25678607f7e8ec75e26163536369b8a14de47aa35609616dfd520229e056d596f77
SHA51209ed69804f14f75356ea2d4e57b7553f7df7cca1b182f9783da585ccb7209f7c0f8c35623a6fb0760779d32bd70301a7cf94d97b6274b58a35eb175ed5fec84c
-
Filesize
512B
MD5a2b40b182172ad2b1d16efa74b4e429e
SHA10ee5c1ca22a4b85ba6713f9f8f2d49c629e6ec5a
SHA25671f5715dbfd805ee0fd21963f6740da9108e89382b528960610360c0fddf53bb
SHA512d1f47a599665e51527da3ccf43cceac169658bb30ae98fe7d5be0019c5a17fd79e798000b93ff609dfdc44e9f32eaa69400c3e16f32d900780a90b06d2490b4e
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
48KB
MD5d0b20ec5370038688b8f677faf3876c9
SHA1b0714de91160b1e187b95e75252bb236704f3614
SHA256f573942311513bb0a4cf5d6171aa2f6bbf7903156372873c0c6677f397151426
SHA512b7d095c9d86a532c8b364257a8bc6dcfecd077de8b65a83594bfb16ceb86649e4d7622df3e9851b77549c2c94ef401dd5aa9b7b5dd3dc559c9752c78044b6d8e