Analysis
-
max time kernel
178s -
max time network
178s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
6478d00b69e5c2561bd38d29f2813fa2
-
SHA1
c9ae761853f981f359a466217cbee390f23fd97b
-
SHA256
43c9703326164f014bb317e79cd79585245259e18e6d4af32b7735b6da5dd2d6
-
SHA512
b0dca0d2c2008b1211197e6debf026c21f296e3834c28b6c1d9e35ab0d774f5b57e5ad54170071a845fd2b02d4abf520cbb90c66753f0fdf192c1353f8f4d105
-
SSDEEP
24576:loL0otaYtXMLeE2sepAvb6vsm0ZGpUvb+jno+G8jy9Wq/13tdHbZKm51Ob83B:2Q7YtcFeGv0sKUvb+jbPjy9Wq/1XHNKw
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.tbus.dlqa.exsndescription ioc process File opened for read /proc/cpuinfo com.tbus.dlqa.exsn -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.tbus.dlqa.exsn/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&com.tbus.dlqa.exsncom.tbus.dlqa.exsn:daemonioc pid process /data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar 4322 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.tbus.dlqa.exsn/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar 4289 com.tbus.dlqa.exsn /data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar 4359 com.tbus.dlqa.exsn:daemon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.tbus.dlqa.exsndescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.tbus.dlqa.exsn -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.tbus.dlqa.exsndescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tbus.dlqa.exsn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.tbus.dlqa.exsndescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tbus.dlqa.exsn -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.tbus.dlqa.exsndescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.tbus.dlqa.exsn -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.tbus.dlqa.exsndescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tbus.dlqa.exsn -
Reads information about phone network operator. 1 TTPs
Processes
-
com.tbus.dlqa.exsn1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4289 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tbus.dlqa.exsn/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.tbus.dlqa.exsn/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4322
-
com.tbus.dlqa.exsn:daemon1⤵
- Loads dropped Dex/Jar
PID:4359
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
553B
MD5c746170de0dc9abcc72465e2f5085b89
SHA18615d386a7e3eb166b35464aff5b8222560b1f2d
SHA2567a3cdcbe83cfc75f33557bc763ccc66e5803483c42e2b6b7bec0c278aa65ab9c
SHA51207c209566b875690987b21f097a1fa287e55995bd2d2215373c54f1eed44bd8014f3e63dd17129ab18a592a33fdc02a970d38699dab63dacfabcf415a6dcfac9
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e68bc21b729ed4dc1a69a2a3ebd8eef5
SHA1fc98fce8884d91d7bad06657a8d08f73eb220f8d
SHA2568f7417cf866d38b6bd86a6b1c257a87213fc34cd61543756cb626da7a924e575
SHA512c0b3d2a2cc6357dc65c597b6840c5f12a394f88389285887cb941c48cc9c30f4603540526d7315c5429e2d15fb7afa83652143b1275a457971447055f47d5fa4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD50b67fddf89d2a147e0724c6a43959832
SHA10da68c045a166127c5c09856b69824e57bb321d7
SHA2563ab8c4236125d2d04657bcd915e80ebe0d8e17a451fb8c4857b13a712227906d
SHA5129e51933a8e0a59f75bb32084709aa3e3778d5cae917e946dc95a76c69d690407dcfb5ba7eca250d952748fefe5027de85778ac52d624dadeb70a94d4959b1503
-
Filesize
683B
MD5f1e22ec24dbe7a64c8e42277a408ad42
SHA10343a06e0cb9877d7297f2e9e91aa3a1b8bcfbbb
SHA25631e96aaf958d16a3275970b98694fd731f5cfc67319b0fbe0d923d71bb7ec487
SHA5127013bda79dcef0bdfb5d01a3b9dcd89b82d53f93f8864cbaecb837e8c71690877f00ba68d1e83fc9ae1f9557cb34523f6d222b629fe09da819942665833608d3
-
Filesize
162B
MD5dc413751349c663fc3af720fee259c76
SHA1d8227fc717f8572783c8f98e2f17b6c4ba87f27f
SHA256712a88bb6b9837ce114e3e3b8a6aa566b9194957a8fef88849a27b52242f55a7
SHA5126650801c901c6b6a39d0de60d3d0837fe0deb501be68c6ef161b27f5649736124cbcf29edc0fbf4489cf8f71a6518984b73bb52c1084b4d837d2247289872c2b
-
Filesize
859B
MD520bb9cd16a85a3bb6f3e38b575085e97
SHA1de50f5fdf2877b950783e391fd92e0044c67ddbe
SHA25676cf46ee32c4b1b59c625b96409a1e1634c3af4f70b5cbf7c8aa629c460b78b6
SHA51277544680d498c7fd2debafa2cd12bf161434bcb5e9c3566cdfd9433425f215ac2603c60b3f7fa0ccae68bbcd9c23144f247783059840b4fd5270dcc31a06be65
-
Filesize
415B
MD55eacb1e83cc6c48d12b78620c9ab3bc8
SHA12695cbf42872d81f2f6df5c0208f0ce1fd904c11
SHA25657ce6b52c331af2590686fac6bc85b44e4d5ec7caf6c95b05b673004f62bf2ba
SHA512edc51b92eeeb180318005ed9c92401eac6563f31ed521ee02d6948c1f28e670688cdb54c42a0279f0edf276e1fac40ba8a7108f5491867ec5d2619efb4d5dbcc
-
Filesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc