Analysis
-
max time kernel
104s -
max time network
188s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
21-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
64732b9f45bfe2522edccabd92bf71ba_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
64732b9f45bfe2522edccabd92bf71ba_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
legudzbait.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
legudzbait.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
legudzbait.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
64732b9f45bfe2522edccabd92bf71ba_JaffaCakes118.apk
-
Size
16.2MB
-
MD5
64732b9f45bfe2522edccabd92bf71ba
-
SHA1
310751c5baf88cfe21079c39a76312f20eb3f170
-
SHA256
4390e02baca09c05df82cf4958bd3f47c2d20005881642f5b19be2bc6af2bdbd
-
SHA512
4e671471632daf453c51413251174ce6adb3822d326e00e1dd0a876f8889cf4b14e793a20e1309014e29d8bc279ae9491bb0b25a0399cec2402ce9772e5044ed
-
SSDEEP
393216:mQSRq1TwQkwPZK6Vupr5GG2xRG3PHUXgFYmtNGIZv580DVV01Nq:mDIUlo6/HUXgGmTG+v5Z
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.yxd.liveioc process /system/app/Superuser.apk com.yxd.live -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.yxd.livedescription ioc process File opened for read /proc/meminfo com.yxd.live -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.yxd.livedescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yxd.live -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.yxd.livedescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.yxd.live -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.yxd.livedescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yxd.live -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.yxd.livedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.yxd.live
Processes
-
com.yxd.live1⤵
- Checks if the Android device is rooted.
- Checks memory information
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:5155
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58fea94651b838dba8ef722ffe611e606
SHA14fce21943befeac33cefc9165fcab3e73d20c13b
SHA256a43432825b2f979bf52adbe6b0bce1b11c47e418c0091a776a5891dec4c25c99
SHA512002254e6ec27d5a3de2ead3af272373fb2157ea09233f7a08acfb5506670b22e1be1804630c2bc0fd8465934208fcd124570eb0d0bdb74f97890a821a03a0d29
-
Filesize
32KB
MD5820167b2f3648a8652567fa192085dc5
SHA11a9f442543c398ad18fcad73c72ea9b58c036f0b
SHA256873c6cc422590c5490934720ad68aea9ea6775de7b20bcbae7b95aab8547813a
SHA5121db56917afead48b18c1e77d87bc9a72ce5ddff044b0b1d349c0d28ad78bef83c51ef0c1f09c19c6cf7a4b3c296b4f9fbe1597393615ff478557f947426c3536
-
Filesize
512B
MD5448e66050e5d4d0d1ceab193d32262c6
SHA143f96f7f33ec2c342a1afb1b5c214e7ca5efba76
SHA2561390e8375bddc435f170cd921a38acbc11e6d9c0c9ce13fd7f9da2598d439493
SHA512034d966ac74dbaa98a6473fccef02fdf88ad1d7fadf6917465b824cd76846329f677486af0bb3de98fcf4e63696e16634f43aadc1deef65c376992d078ad1503
-
Filesize
8KB
MD5d00d6268a5024d19e6a6370e49437751
SHA1626f0156cae8d437078c6f9a19c6f72ec33116a7
SHA2566fb96f182a1917bc42b31e4e209896fde3daeafb31c4b307fd9581b8b6d7d164
SHA5124ae7d665d8a6572e7a1fb1bf12b64a82ffd25574de3f032ab77a1745633b1dd6098d7ecdd276a59ec920256eaea8c5e4fee56c00ef28fca7395ab5e86f628841
-
Filesize
8KB
MD508430d65a3af96afeec12ec02ac87318
SHA19aecd1f7dcb8331cff424cd3e00d09094a41e833
SHA256607b6f5ca69306204d1b0fa28d365c82bfa42fad8c6b0c4b34bde05a111054ec
SHA51228266e963e892b063c5beb9b2bb44b68fb806ad53d077dbf073e68b404c5909c1c5d3736e728ccc38a42f04f20bc904391bc255b2606f70709ae226e5c18b6b8
-
Filesize
8KB
MD5b9a5e1b21f4cf462af456419808ed93f
SHA13601d6dfd6161d2655d8792bf5af69e99a59e8f0
SHA2562e38aa767b4935133cac18e8fb291726738501e90407bcf1e0287eec7583d129
SHA51226b5eff378fb025f5c6d9e7151f2a98468ad1d7269f3dee43320295668fbb3456d832f5e041548af8ae0d96cadd420f9b323f36872e08b039b054e9026854754