Analysis
-
max time kernel
5s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
16/05/2024, 22:41
Behavioral task
behavioral1
Sample
4d5e6377fb7c0a0ec5fa153e8d910edf_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
4d5e6377fb7c0a0ec5fa153e8d910edf_JaffaCakes118.apk
-
Size
3.6MB
-
MD5
4d5e6377fb7c0a0ec5fa153e8d910edf
-
SHA1
eadbedec5ac16fefe8672b4236a888da5d2af21a
-
SHA256
cfe969ba03e73d96e5a6b92496685d2c462ad32549443bb12c87135d7a3ba5e6
-
SHA512
08fe37bf2cf86eb75d2c56811e8e1d93272f429a6c90670bb3ebb16e949635db6261fef053652787c788ce3dd9729476411c439ceba5727d1bf32525685dceeb
-
SSDEEP
98304:iiA4hlqWkQbHSvmypfoCPOUt/nK2WbT2OIz9IEZ:IkHSOypAOt/zuT2OIz9IEZ
Malware Config
Signatures
-
BadMirror
BadMirror is an Android infostealer first seen in March 2016.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.tinyhorse.popstar -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.tinyhorse.popstar -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tinyhorse.popstar -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tinyhorse.popstar -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tinyhorse.popstar -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tinyhorse.popstar -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tinyhorse.popstar -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.tinyhorse.popstar
Processes
-
com.tinyhorse.popstar1⤵
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4281
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD5393c3e2c921461fef6ced7d32a875196
SHA1d9594fe1bdda5ccd647cffb7a1a9125baca8c5fa
SHA2564c5733cc204166b13655fe11e4e478afb9aa9a43b45673783d3c0f29e203348a
SHA512d030bc161cd0f189b0dc7b84e0948146798d3c9103d57f98d8c50e22005ef447696a5a4b963f27ff7124427a0944ee48d60b05d746ec66af2643ea342e79dd5e
-
Filesize
512B
MD56114a2976856c3634401a2489429f807
SHA12a099a0fd8238319330deb8289dbcfb7a5417006
SHA2566a66ec4a0e944864f76e103bea8dbf16e9a1a5a1d9ea719beb3d50073f5bfa86
SHA5122ee29e381e69a8e2fa37f06cec18c1d008e49f4b97c7dca32aaa7242bf11bf0f1912bb16c01992c54a2edd02e29070fdbae3610633f9db80888aba8f434f5c96
-
Filesize
310B
MD5a82588a78bda9e63ca6f65878383ec4e
SHA12a90387412d4f20bf16083d3966f5d927d6370e4
SHA2560bb77a5e95f10766a6a048c68c28c5b3f0ccce224abc934cafc6a69919d24c96
SHA51215f7012de29c079d5e27493a2971f6afbbe7e925b5eaa849aad376e370764dd13661f78b7a827574579cd88bd6d1bca874d8fd284ef8656a7fec1ad97e4dee56