Analysis

  • max time kernel
    128s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-20240506-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system
  • submitted
    14/05/2024, 04:48

General

  • Target

    3ded46eabc338e03cb68d020c7f0f518_JaffaCakes118.apk

  • Size

    28.1MB

  • MD5

    3ded46eabc338e03cb68d020c7f0f518

  • SHA1

    1488163acb0d02dc0cb36f9f8035007d97a84f3a

  • SHA256

    1fc3a5eadccb903215f5423c727a2314b6161ceea59328b08481869f05421c33

  • SHA512

    fbe33e0e49135b792c3e592b267c69e025b51f37287e199d57462259f097dbaadc747f0eeaa7cb69b3ebcfec599510b30ae43bcb8d4537d71664fc6f236923a8

  • SSDEEP

    786432:mY/g1V5fsJ+Nhvj7jpVQtM9wTXYLEN9ySOorp5rHE:mYo1HE8NdjXpyt0xLSOo3rk

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Makes use of the framework's foreground persistence service 1 TTPs 2 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about the current Wi-Fi connection 1 TTPs 3 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 3 IoCs
  • Acquires the wake lock 2 IoCs
  • Checks if the internet connection is available 1 TTPs 3 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs

Processes

  • com.osagg.pixeltanksarena
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks if the internet connection is available
    PID:5167
  • com.osagg.pixeltanksarena:service
    1⤵
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Checks if the internet connection is available
    PID:5316
  • com.osagg.pixeltanksarena:protect
    1⤵
      PID:5397
    • com.osagg.pixeltanksarena:protect
      1⤵
        PID:5714
      • com.osagg.pixeltanksarena:service
        1⤵
        • Makes use of the framework's foreground persistence service
        • Queries information about the current Wi-Fi connection
        • Registers a broadcast receiver at runtime (usually for listening for system events)
        • Acquires the wake lock
        • Checks if the internet connection is available
        PID:5872
      • com.osagg.pixeltanksarena:protect
        1⤵
          PID:7330

        Network

              MITRE ATT&CK Mobile v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • /data/data/com.osagg.pixeltanksarena/files/mataid.txt

                Filesize

                5B

                MD5

                fa980e7b000b6545a4c0c5373eb1b7f3

                SHA1

                68e6bf7d9726347c1d3b5112a898a8494aa0b6ff

                SHA256

                a243c70112ec1b3924c8d4f629beef87dbc534344649bf91741550a932856ab3

                SHA512

                d8d4b293c53f63ad475bfda6bd1ae91ef45c2f711a8a877eeb6871794fcb41bb91cf69dc90d541d220ffbdffc018b7825927d0a8e0929df54b5327a706f7035f