Analysis
-
max time kernel
178s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
61734b9c1ade7c87613bc4ab3f6a37f7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
61734b9c1ade7c87613bc4ab3f6a37f7_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
61734b9c1ade7c87613bc4ab3f6a37f7_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
61734b9c1ade7c87613bc4ab3f6a37f7
-
SHA1
83f91a1ab96f4d2dea38b1c0e4272d56e24f8f57
-
SHA256
705bce296406b2b3eac808f1bba499f13fb096a3ddda64ebee6754f09d7c28fd
-
SHA512
0ccd702d47dcccce9fdeb5152bcf7a039a68c560ba0fc15f725fa2473197c59551a20dd79a76ec45a23505d539ab122e08b2a08b8572b3106555ea6538baf50d
-
SSDEEP
24576:/oL0otaYtXMhe+8X3lUKfcfIkuovSp0ljbo+0wjEXoq/13tdHbZKm51Ob830:AQ7Yt3X1wvTvSpuj3ZjEXoq/1XHNKmjg
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cepv.eiri.ouzucom.cepv.eiri.ouzu:daemonioc pid process /data/user/0/com.cepv.eiri.ouzu/app_mjf/dz.jar 4609 com.cepv.eiri.ouzu /data/user/0/com.cepv.eiri.ouzu/app_mjf/dz.jar 4676 com.cepv.eiri.ouzu:daemon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.cepv.eiri.ouzudescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.cepv.eiri.ouzu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.cepv.eiri.ouzudescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cepv.eiri.ouzu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cepv.eiri.ouzudescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cepv.eiri.ouzu -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.cepv.eiri.ouzudescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cepv.eiri.ouzu -
Reads information about phone network operator. 1 TTPs
Processes
-
com.cepv.eiri.ouzu1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
-
com.cepv.eiri.ouzu:daemon1⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.cepv.eiri.ouzu/app_mjf/ddz.jarFilesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
/data/user/0/com.cepv.eiri.ouzu/app_mjf/dz.jarFilesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc
-
/data/user/0/com.cepv.eiri.ouzu/app_mjf/tdz.jarFilesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzdFilesize
28KB
MD5fdb8a92e5060ce104e8f0faca55a47ce
SHA1270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
8KB
MD5f38c36e32705fdb57719d6a2d75993ad
SHA1a4cee80b7cb553900b4e141336977119e5ae96b0
SHA256cc25e2fc315896bade4f02acb791ffd6ce0bbba04672269c23ef2287e8f2c93c
SHA5129d6bbc6dd51c284a5a78f0bb7caf032f3877e81220802afcd02d000727d8f25d2cda63375412a1d450f26e5033f85c71b05b9dcbce141d9f075979ed85a5a946
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
512B
MD5a85f3539459ced4874a320f5c66b4b36
SHA16887dc374902a3af3126d3ce3b19fb0a76139189
SHA2564b45faa611add5b60f5b9cca869cf0afb8bee00c44cd7ebcd339acda9502ef0e
SHA51219c9d1eae3359815352b9f0c3e078b5c2f99545ee8f66ee76e8ae40eb8c12e6a6a7147f0c8073ef8f577acc376053ab34d46f16233506a05886d60106b2b75f7
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
8KB
MD5869ae278512c1f0c724730a791a4e12b
SHA19eaa741df3b9aa45a4bc5db02085c623c60b8619
SHA2567972aa24480429871a9db0e77f380e2a0a25cf5d57eb61f5149557a349e4ec44
SHA512578b374abbf9914ebd07e4ee61832e57988676a5832a497e2d426f725806d1f891920c64d435db3cedfe74206e3be75fc88fd4d4923870330788ee1f8511f65b
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
4KB
MD5741085fc0214904eaa13c0b3e5a4b109
SHA1336dc89c0f5c5aca9d8b3704ac19b6580eeb0183
SHA256d765e301ff24b2c63b4b33f61c0bd69c2be7b2a41395d9f7998156f19b08bb2a
SHA5123b5260c7fe844f9feb61f5e3afd4eac2ba2d9ced9d17eeaf47993cf1d4c3b531e407a002e0f86edc9a5121a98d05230d6ac86ab92e9054eb627cec513ac02c47
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
8KB
MD5f5220b920262faf081db8b732b65e45c
SHA130dd8458a1fb8782d492d525e78e3d25d557bdee
SHA256a727b34220b360f472ec420e4c050de673097206f84f5660d269901d3eaf55ba
SHA512b58046ff500395da1b5fb0fbe716fd87fd1aa51175892b7cfa829ebb250880c5023c2d7a0f1fc46ac5713ea36070aa73eb9fef647f5d2893e2b8188f59516d47
-
/data/user/0/com.cepv.eiri.ouzu/databases/lezzd-journalFilesize
8KB
MD54da61382ddcbad2a3949be6e2f3cee0f
SHA1b583608a7129dc11d279b4d92686ece6b1875f51
SHA2569e67028a921a72abb2efa570704a12b058c3f5e4db98818a0be652c34d8640ee
SHA512b04df0e3733cce6a0b15df499f826cc89256b85c682721da18fedca294edb996cf2cb05131b5eaa54d6365e2a4f014b820dd34fdf51b68b910be08734b4640fe
-
/data/user/0/com.cepv.eiri.ouzu/files/.um/um_cache_1716251328406.envFilesize
652B
MD596100e86c44625c4e11db784ae4d37b0
SHA14625a7c56b96fb199e89a735b3619e788d057816
SHA2560637934cea670d0b292dfda588bb1542ff9c544c74bb43f81fe868866a57b57d
SHA512576409ddbf923977e8241dc8f0997a8d3549ae93625e0803188de6cefa41e08bed743785f744cd37b7351ffbfb6a80358fc3bea3f5f4c3f950455012400a47b5
-
/data/user/0/com.cepv.eiri.ouzu/files/.umeng/exchangeIdentity.jsonFilesize
162B
MD5c4c8f068aad2b094d45821ceafd2bc5b
SHA136f8ee374a6626a02ab13edf969d122a032f486c
SHA256738cf03571b18a2f3c4b12908632d1f0e3909889344d9d48f8189832db43e1a6
SHA512f0d5cb71e03e6d1de9641b0696d6899b02c03909294abc8837e99075679731cae48aeca539ecd0d34aab5e4c62b6d095e40894694b911c976ad49c0548b74d7a
-
/data/user/0/com.cepv.eiri.ouzu/files/mobclick_agent_cached_com.cepv.eiri.ouzu1Filesize
791B
MD587738a91f368e47b406cc381cb844f6c
SHA1924db812e2448433f07ec2954bfa44b7a837505a
SHA2561462828cb42e40575f87bc6ecb64364caefe4ecad94462832fff5e3ec49e8e2a
SHA512a7548940a86d97693cc85c11035f7fd73f415431769bf7fac8effc9b338e58a17b06a3dd7605e64040dc486c48fe63ff345f050e9d71ee379fb23788794f87b3
-
/data/user/0/com.cepv.eiri.ouzu/files/umeng_it.cacheFilesize
348B
MD56187579ad0b34b0c544a80fbe66ba2e2
SHA15a93577cdf1e56e455fa86a5532f563261f4f4ab
SHA256f4fde017c1db9cfcb6aef2719ce849312f711b81866c9ae7fc07a87c9a1cb5d9
SHA51220c4734054ce431b0b1df647b1a4e5fc744d73137df99464b4909f3f0d4e25e679bad55921aad56f7dd4bdbd41422838c37487098eb2fc3a16e6c443938876e8