Analysis
-
max time kernel
128s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
14/05/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
3ded46eabc338e03cb68d020c7f0f518_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
3ded46eabc338e03cb68d020c7f0f518_JaffaCakes118.apk
Resource
android-x64-20240506-en
General
-
Target
3ded46eabc338e03cb68d020c7f0f518_JaffaCakes118.apk
-
Size
28.1MB
-
MD5
3ded46eabc338e03cb68d020c7f0f518
-
SHA1
1488163acb0d02dc0cb36f9f8035007d97a84f3a
-
SHA256
1fc3a5eadccb903215f5423c727a2314b6161ceea59328b08481869f05421c33
-
SHA512
fbe33e0e49135b792c3e592b267c69e025b51f37287e199d57462259f097dbaadc747f0eeaa7cb69b3ebcfec599510b30ae43bcb8d4537d71664fc6f236923a8
-
SSDEEP
786432:mY/g1V5fsJ+Nhvj7jpVQtM9wTXYLEN9ySOorp5rHE:mYo1HE8NdjXpyt0xLSOo3rk
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.osagg.pixeltanksarena -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.osagg.pixeltanksarena -
Makes use of the framework's foreground persistence service 1 TTPs 2 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.osagg.pixeltanksarena:service Framework service call android.app.IActivityManager.setServiceForeground com.osagg.pixeltanksarena:service -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.osagg.pixeltanksarena -
Queries information about the current Wi-Fi connection 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.osagg.pixeltanksarena Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.osagg.pixeltanksarena:service Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.osagg.pixeltanksarena:service -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.osagg.pixeltanksarena -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 3 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.osagg.pixeltanksarena:service Framework service call android.app.IActivityManager.registerReceiver com.osagg.pixeltanksarena:service Framework service call android.app.IActivityManager.registerReceiver com.osagg.pixeltanksarena -
Acquires the wake lock 2 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.osagg.pixeltanksarena:service Framework service call android.os.IPowerManager.acquireWakeLock com.osagg.pixeltanksarena:service -
Checks if the internet connection is available 1 TTPs 3 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.osagg.pixeltanksarena:service Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.osagg.pixeltanksarena Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.osagg.pixeltanksarena:service -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
Processes
-
com.osagg.pixeltanksarena1⤵
- Checks CPU information
- Checks memory information
- Obtains sensitive information copied to the device clipboard
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:5167
-
com.osagg.pixeltanksarena:service1⤵
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:5316
-
com.osagg.pixeltanksarena:protect1⤵PID:5397
-
com.osagg.pixeltanksarena:protect1⤵PID:5714
-
com.osagg.pixeltanksarena:service1⤵
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:5872
-
com.osagg.pixeltanksarena:protect1⤵PID:7330
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5fa980e7b000b6545a4c0c5373eb1b7f3
SHA168e6bf7d9726347c1d3b5112a898a8494aa0b6ff
SHA256a243c70112ec1b3924c8d4f629beef87dbc534344649bf91741550a932856ab3
SHA512d8d4b293c53f63ad475bfda6bd1ae91ef45c2f711a8a877eeb6871794fcb41bb91cf69dc90d541d220ffbdffc018b7825927d0a8e0929df54b5327a706f7035f