Analysis
-
max time kernel
179s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
64d9597adb9df9f9639d679625ce44f0
-
SHA1
0995b131d1caa8c08ed543dba50248cffa019ff2
-
SHA256
23017cf18a4b707769ced016570ab097c5561f742ad9511a3d2f4871ebced3d6
-
SHA512
0c42c5a2fd4ed2dd1522a116ac71f227c72df0fadfbad65e46078e996908fa9dfc909eefa7ab4e29adff430c10d94c23e14fe2907d7b934e612c083682e8d7d0
-
SSDEEP
24576:OoL0otaYtXMheC8X3lUKfcfIkuovSp0ojro+H8j/qZq/13tdHbZKm51Ob83L:dQ7YtbX1wvTvSpLjncj/qZq/1XHNKmjH
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.vpkv.iupn.konddescription ioc process File opened for read /proc/cpuinfo com.vpkv.iupn.kond -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.vpkv.iupn.kondcom.vpkv.iupn.kond:daemonioc pid process /data/user/0/com.vpkv.iupn.kond/app_mjf/dz.jar 4251 com.vpkv.iupn.kond /data/user/0/com.vpkv.iupn.kond/app_mjf/dz.jar 4308 com.vpkv.iupn.kond:daemon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.vpkv.iupn.konddescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.vpkv.iupn.kond -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.vpkv.iupn.konddescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.vpkv.iupn.kond -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.vpkv.iupn.konddescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.vpkv.iupn.kond -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.vpkv.iupn.konddescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.vpkv.iupn.kond -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.vpkv.iupn.konddescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.vpkv.iupn.kond -
Reads information about phone network operator. 1 TTPs
Processes
-
com.vpkv.iupn.kond1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4251
-
com.vpkv.iupn.kond:daemon1⤵
- Loads dropped Dex/Jar
PID:4308
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
682B
MD5b41f04d78ab35715609507edd55d547c
SHA14ceb019441177ee24efc8b614c2554735d19f915
SHA2567e6b18cb8b7e669616413497a2aaf71202f22b63e00a8999a2ec24b9d8d2e8f9
SHA512f810c8efeddd61e2425ed3b3dece24179ac5e3f0acda5deab5d8cd5b799e97f06347f20f9f8c107c91d62a31cb3be90914c8aefd0b7d7c00d4d68f553fe7c065
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD55084ac15c60b112c13fe4dae902ce958
SHA142871da7920982cfef99643a8338a70ec5dbd96f
SHA2567451412d34dc22d54b17ab5ba8aa1d7f07ff31e4792ad30ee6b76c5e86df0488
SHA512fc9182714a7f0f26887ad3a2675583c9b318e9f7619c0663e87a03aa0815f92bc255f4be3afd3af03362e0b06a8c3ce97bd88b173f399a26523a8899251d49d0
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD5433f8fe6be5928ac646f14b905f911d0
SHA137dc950760b742c7752b5b59204ef684b55e392f
SHA2567d4df58fcb6fcdea759bfb549b4097ae363b09d8ddc8410724d58005cc445fb6
SHA512c5d3c44680531d4dcfb27ec7622235713928ea579609c1bcdad1f8670b0c3c3e5a113b0d7cfbd94e35e3941bd2c2a8b12ad74b0dcef76effd9edceec1949d042
-
Filesize
1016B
MD5786f4d65e6e92ec896ba5c04fd05b612
SHA1ece2f32cd6f9322d1032df6633bc53a1d904064b
SHA25654120a42eee7eee24157925deb9ed7c6b04ec3863b3984370fa2129849271ab9
SHA512ff7cf3e888b1dee0e6084a9da521e797950932783a3fd0782e8f34ff0f652668f5a02c7be404c7e33d656a5b57faf6385b0cc583e0ad129dd1d1d5284dc1ec84
-
Filesize
1016B
MD5beca6b463607430626681be9297ea031
SHA1d97dffeefda8bb6da4680f5b6459de7e7228ee40
SHA2566eb68463165395eb9214787c651cd1018ebb111fd7e9c1e2b165a79a97b52694
SHA512093fa5557495cf8965609e9add218223deb4cfc749cd7dcc52f512db79fc1be5d4b9ca751b79db9895682d92660ef88a9a70f3037c98d102527b18fefc1dffcf
-
Filesize
162B
MD5316397a0c8935a4049cf29767966fdef
SHA130cf6adf26bdead7a4a74287889efd65f4e15f4a
SHA2560d75734d07c59bad6e3531f09c1deb2a2ed7ae70fa445cb20f955923c8676927
SHA5120275db5e6a36d77908d4f3ac76346fe3e7c6889da7bc7f8ba1bcdb90aa8fcabb2d62b9f9161d7e40f1105a375646a3b1354b46bb340552a19f2caddb6efba70b
-
Filesize
204B
MD56aa195f8b6fd064a197c48a443115dca
SHA1e54e742feb403564259726878e5cd2d205dfb3cf
SHA25600774e31822fac0abc0eff61fda0e6eff46519c00658bb47a299e0f10b80e8fe
SHA5123121a042c89d49c37c29b77addd0934461724ed707c0497472403e9dd829e97689dceeaf6702675179991b3e6e839549baa2184e289dbb54b7927ed8805cbc83
-
Filesize
415B
MD5d9d1b972067dd1de6863f57b910f94b3
SHA1e0994e0c612b947f656585b79fe970b573140f69
SHA256ba6aab44b17917fd99c021aa3bc7b12c1d6f2c238795501caaef7d7d422c2136
SHA5127f9ef7fe566357cba1bda8d8905789104fc5d1d53717573934026ac611db711e71c3c6d795e3640898dc7eb17ff36a117b93d8c2b250bee79f15185d050df7c0
-
Filesize
211B
MD55fba7daf0a545cb24b10fb87f906536e
SHA12a15411ddb4702c514afae6f4171a5865cd03aaa
SHA25649258e50e84bc5d8d759df9c02f0d69c22e329133f05e32603380c927941faa3
SHA5127f181ef8859f0762611125f32a7a01bf3f3a1569b965e360b4e4b9ce9a8989abbd58912cc546f2ff33dbb5079db10a82b56e869f85c4b1b59f06ae0ad8b52717
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc