Analysis
-
max time kernel
30s -
max time network
157s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
-
Size
7.3MB
-
MD5
619699bc05aa8c38d67eaf6dde54571b
-
SHA1
4f614036e8c53016a0f8cab8b4043298b7c5f334
-
SHA256
b388990fde8dcfcde731b3188e59975d3c1f51f2f6678a23a4935259681018f4
-
SHA512
f520b30d2a3ca731cf4c69ad68411bd9a49f418482322303e72b05b6f4301f76cfae3098308b9c0ee8a8c5791b12df3026fa4745091626916dcd0885d384cee8
-
SSDEEP
98304:/vu7EUpGuvGuOWqe4gImR7lvDb+i3lyCkori+cGQxaTO:/WQU0Cqe4l+pvDbUCk9+cOi
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshalaioc process /system/app/Superuser.apk com.nanoinfomatrix.Edu_Pathshala /system/xbin/su com.nanoinfomatrix.Edu_Pathshala -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Processes:
com.nanoinfomatrix.Edu_Pathshalapid process 4315 com.nanoinfomatrix.Edu_Pathshala -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process File opened for read /proc/cpuinfo com.nanoinfomatrix.Edu_Pathshala -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process File opened for read /proc/meminfo com.nanoinfomatrix.Edu_Pathshala -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/1582435991586.jar --output-vdex-fd=146 --oat-fd=148 --oat-location=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&com.nanoinfomatrix.Edu_Pathshalaioc pid process /data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/1582435991586.jar 4492 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/1582435991586.jar --output-vdex-fd=146 --oat-fd=148 --oat-location=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/1582435991586.jar 4315 com.nanoinfomatrix.Edu_Pathshala -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.nanoinfomatrix.Edu_Pathshala -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nanoinfomatrix.Edu_Pathshala -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.nanoinfomatrix.Edu_Pathshala -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.nanoinfomatrix.Edu_Pathshala -
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework API call android.hardware.SensorManager.registerListener com.nanoinfomatrix.Edu_Pathshala -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.nanoinfomatrix.Edu_Pathshaladescription ioc process Framework API call javax.crypto.Cipher.doFinal com.nanoinfomatrix.Edu_Pathshala
Processes
-
com.nanoinfomatrix.Edu_Pathshala1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Listens for changes in the sensor environment (might be used to detect emulation)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4315 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/1582435991586.jar --output-vdex-fd=146 --oat-fd=148 --oat-location=/data/user/0/com.nanoinfomatrix.Edu_Pathshala/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4492
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DBeginSession.cls_temp
Filesize77B
MD54af88f6d3c604e809904a25a40c00d17
SHA19770fe6fd18199917695d72ca1fdc18c54677712
SHA256c5822e75a536a1b59f82d36d83f7ebe387db5a5c4470f188ea566baa4edf833e
SHA512cc33dca5a88a304805f252ac48d0cbf711c52336984fe3dfbb1defb82838f48507c13c32af1f6604b05b2855de92a61a96e56f1add0e003b47f86e036217cabc
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DBeginSession.json
Filesize132B
MD51c4c76b67c11d785d9dcc29cf382f4ec
SHA15c3cc956bb424e092cdae3be144a99151750228f
SHA256a94f3cdd4629fbdb70a55d92f9c135e75b62ade52a4d49bbb22cef8ca93fe920
SHA512abd4d1a0bcf7e83875d73f6d81527047917cfe072aacd4c9239949849aca927505808623c547d9c8ed356105852a4aa6321ca0fee6da094c95651a26669d19e9
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionApp.cls_temp
Filesize126B
MD5f73d665ab9a4cb59589260e0bedcc81f
SHA1270298c6b54024691a5afc33d8f357e5700c4460
SHA256bc9a5f13e6a5aa3a5cdb5f8545c32df62c680bc532bbd87460595721a5c32328
SHA512c898bacf7cce9755deb541e07087da10285b75917991ee4b42591b651361da9bfba17246907ee1cef71a6cd0fbf8902f83668974c51a7f4d8e7ebb1a98758f81
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionApp.json
Filesize240B
MD50ea7a15282e3ab2da1020b21d338694e
SHA16f145707ef1f819a8cc9c1668eafd787b1478d9b
SHA256050241acfd4d1d6553908436fd082b93e09994a4704101320d9db013de80f6fb
SHA512657fe981d592e4c58e78ab00cdbc74893914918f7c285eb0bcd94427161b4f8dbe94a44a37116911946d3c924b941405cc62f475c6e116bacb741dc9efceec5a
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionDevice.cls_temp
Filesize70B
MD5190a8b09a6ea32d76654cc4e71499257
SHA1f49b9e1fef4bca0972eb3cc5244ddbc95da035fd
SHA25653d9cce177f62c4852d56c74f4a6c36192b35c99c8fb332bb3f734396f38a8f2
SHA5127b101337e1321a75880dd1466977c348912bd018812e5c5a34100d6a8cadfc1ccab266ee2d9938a6bb535d4bb48fc95bac89c3ab14c2c05d328c10fb0b2111f3
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionDevice.json
Filesize204B
MD571215d8820809736b3f67c0d13aca469
SHA162c03b2c23016ff6e3934b359099da149de0fd0b
SHA25632275d53ea75da059fd86aca9facc7580d22e075fb006fe9f98a575fae06d216
SHA512425c74bfe6da820a7f2a3e241c7745434cdde8f164fa3ebe92ed6d73c22db5c7482cfc31508e7662a4388f58f313bf69d3d46c01f9fd1e707c08ad93892090ee
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionOS.cls_temp
Filesize14B
MD59b3d4522944ce6396563812bfdb92fa9
SHA16d2a6133c8f01938a48ccc77ef86ad8ca335c020
SHA256d32805d685a3f50caa7f1c0bd7c8804c4d937a866513289f60e3184f7a591ed9
SHA512091d87643712530bf9006135db42a5a50742bb5ca3026bcc5f2c1c17bf4fd984a8938d29263b0abde3d15cac196d2230902534e200b0b79485e3a1bd97d95727
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/664BF6E603E0-0001-10DB-5EADD81D3E9DSessionOS.json
Filesize54B
MD593023624eb8dff5c20050da136aaae0a
SHA1acfd1ffed752c28fb135ba83c0c6345ddf2f6995
SHA256968bcd7c4f1abed89a09cc0e6dadd238a81e8655e64196b39a86be49ceecd39c
SHA512bb25dfa144d3f0e17203936c503c5fedec5f9ca710e177f99e273010ba4a682199d4bda5684151d65f3cb1549f4611b3a645ce39646d3db9a1b2c17d6b160579
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android:answers/session_analytics.tap
Filesize951B
MD5ad72b39617297e1a97e57df6fbbd238d
SHA1cb3f5efaa2921687d6c39c41f869299a6fcabc20
SHA256bbb6131b9e09cbe6d65431c4ffa561081d4490945be0f1ba1c0737469650c656
SHA512b90356f7019a5bd29a36859721e563ef71536ccf1d4e294c046aeb82985cb30ece8d5b7c57f9ac0c0f49e3f6f702ed4bc95514048a41149713dbeb61ab8c9a17
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android:answers/session_analytics.tap
Filesize474B
MD53da93c62583f1e4dfba69149f7dc72e8
SHA1ea1ca8d4a82a0bb163f813533aa34e2331de8442
SHA256c4b5bcec517c99f00d3ec81233d1c099e1510a5cd5646a26fb41a7ace9fc9214
SHA5127aa5755ceadfcce9b4cdd6a653e72da489285df4a5f320d558603d2315a3ce2b915fac18f92369751e5f2c39a0faf514cca8510392d3b7de430669a0c67feada
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android:answers/session_analytics.tap.tmp
Filesize16B
MD5c33583fae4e0b61cde1c5b9227963237
SHA1fe2ebe4d27469af1460f7e852031a04208ef629b
SHA25635c6d6e5b93657e4a741a1cec71c21813fe05aab219909ebbb0f62fb0ae648dc
SHA512fa09047004bec791b23f0dade0b64f8ab9bbd67555505e0d0818f6e89dfe56f474df80db0786d081d36adf23a5bacea40275ba043444a3a85d3d9612575bdd1e
-
/data/data/com.nanoinfomatrix.Edu_Pathshala/files/.Fabric/com.crashlytics.sdk.android:answers/session_analytics_to_send/sa_1884be0b-a455-4125-b5ba-9fe57fe8d939_1716254439677.tap
Filesize373B
MD56a0e5647286873bcbeb39de3334bec7d
SHA139296c0ed0a7fe82a2449df9f472e23f7b8a6847
SHA256f8fb2a20375290d9cc6a8b5436778f6531ea2692505632a4b1d472d6b5efc336
SHA512dd3fd3922058eeae0536f4868dfd30fce01c05fabae026bec4f3a1c366c364eba98afecdf538f8c87931873d741e5127b620abab22bcbb08dfefb804403d6f23
-
Filesize
36B
MD5f2d62dfd8deb6e8c8aaad81fa410a71f
SHA1ee0b861651e4b92c782edb2cb52332b3ed8b5ca6
SHA256a0183f14a3904f9c155f39dc55e900c943a95ca66e5c0641de1fba93048a88e3
SHA512f81df522e34c0cfa76255ee6d1498a902a0e90b4226e813722d4bd3779f9f74d0d9fec4335bdf5514b067b8e9399680f32f6eba1f102cbdef0207ebbca4545af
-
Filesize
358KB
MD5823346d9cf7ad857698594efa439d03d
SHA1c4b3ed17fbaf5baaaa7cadd606490261a59ec6a2
SHA25661f2361d12d6e00f21b4f1a3b3da88e3a83be0377e65c114db8933aa4e8b7dd7
SHA512f1fa3b49932b7c8728d22980b8909b80fc7f74f1d235941c7fe335dd7d0b47b64b92cefedcdb1e68100b3c53f090916a0098bee13408b99778b77013e9962d78
-
Filesize
631KB
MD5e14aa374a3098d17bb1f2c224edf4939
SHA163020b5cf238c66265a673c402d5cd814e987da6
SHA25653233f371734357aaccb6c2648f61df974891430d0fb4c4289fbf02f05546660
SHA512599d9b2f4f23c2cf879fb29c89b5aa25e83fe749faf5f01933019d0f50974992da3c4dbf8180be4c194ed4b5cc5fdade273fe5f02290e13d50fe57877b777fe6
-
Filesize
20KB
MD52048eb6124a452540ee51dae4145aadf
SHA1d05005b2cd7fe4cd652b0d7fd1bdac2c19d51451
SHA256105c54b6fe3f25350e92187467761598e4c21d62b1091b77d091f65f3bd98864
SHA512bb6cb3853dd2a5d0701e20607d4e153ae201268dd2e5e2d06cc2df208b3b4dc50132a4ab428251b1644d2399fcc717662438d082ff14203387bab8794109d44d
-
Filesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56