Analysis
-
max time kernel
2s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240506-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system -
submitted
14-05-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
Behavioral task
behavioral3
Sample
plugin-deploy.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral4
Sample
plugin-deploy.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral5
Sample
plugin-deploy.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
-
Size
9.1MB
-
MD5
423275acf0ed96c26ed3d108fcf89644
-
SHA1
cc8a00f93f9fbe09da7ae1427379ea1e8ddbda1f
-
SHA256
0764d827c03a76a82d8cd263c4cd78684247eb1f0d9d8d0599a4f1f18fb32b18
-
SHA512
44c4694e4bc1d1655554deccd2dceff1bcb3baf1353398f6a711e76aea3b7061bd3d419e5c0808d691b3ddee805a6106d855689817c9aac14084537f71c2a1ce
-
SSDEEP
196608:3FhhHFAVUEF2WoQf37pI94BY3tkxilKyuVwi1rnodRccb+nQ+20v+dvKDsj29lzG:VzlAKkVdNAttGUuVn1rnoHccD+20YCD6
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.baidu.zuowen/app_push_lib/plugin-deploy.jar 4957 com.baidu.zuowen -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.baidu.zuowen -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.baidu.zuowen
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5394bd5d7d2d595c19a27fa95959efc23
SHA11c19442c8f05af69d8cb01b4c0836dc836c66b8f
SHA256af090825241b7b0c0fab2f6fb72601204fafab385076d3a54c00711a52784e27
SHA512ef9b2484f0e02c6d53ce76b4daf0182406fe72674bf051abdfd8f5148805342c5468a48d92eba5ebee3172cb546907a09b9e731f6b60e762394514f8e56aef82
-
Filesize
533KB
MD5cdfdbe1021a6269c6c5d5753d8f91f06
SHA1173bfd5a9fc6681eceeccccd73460076f94906c1
SHA2563923d4f2b26e4969819e2c791605959ae7394b91ccafdff76dd765b2d61a8f18
SHA512b80bf59fdb2a19fbfbd53325a86d71df0912ce4e7c86b59813528b863c500f816cb7b7ffcb52881cba3475b0ebe3565ebb8864c59b507f214dcefd833ccf807e
-
Filesize
174B
MD5a26e6353e7f666766a37bf1454cdbc64
SHA128289502c5514f908ac6a976dd8f5cf4394f79bf
SHA2569730af348d9c0d7b366e8eaef67b03f88762424539026f5018db2283fefac855
SHA512f1a5f41fe956a591934cf36907483b85bb105b3f557da67791c12cd81c99632c39d7bc740007f91b1b6b3336b4766304cf02c0742f3f4ed0aa89ffc475ec1f98