Analysis
-
max time kernel
167s -
max time network
182s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
658732209be1e4caa0cb665d565634c7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
658732209be1e4caa0cb665d565634c7_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
658732209be1e4caa0cb665d565634c7_JaffaCakes118.apk
-
Size
12.5MB
-
MD5
658732209be1e4caa0cb665d565634c7
-
SHA1
fb1b035e193a72948cbd39809956914e87ae630d
-
SHA256
436235cd3bbe71e25bd091b284108efa40ae6dfae440c734072df2c9ed980b6a
-
SHA512
ebddad57dbcb475993d94dc72dfd80cd1f93f49079fb0d85752e902c6e59d91449dcc3fde3167388c393bb3eed667d7f14ed2bbefe951945fcaa9189c8157e61
-
SSDEEP
393216:ugkayoeUsZBiqs0Onl+PKhsEWJP6XgWVcfa:TkaDelIDl+PIsXZUcfa
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 4 IoCs
Processes:
com.smiier.skincom.smiier.skin:pushserviceioc process /system/xbin/su com.smiier.skin /system/bin/su com.smiier.skin:pushservice /system/xbin/su com.smiier.skin:pushservice /system/bin/su com.smiier.skin -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.smiier.skindescription ioc process File opened for read /proc/cpuinfo com.smiier.skin -
Checks memory information 2 TTPs 2 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.smiier.skincom.smiier.skin:pushservicedescription ioc process File opened for read /proc/meminfo com.smiier.skin File opened for read /proc/meminfo com.smiier.skin:pushservice -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.smiier.skindescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.smiier.skin -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.smiier.skin:pushservicedescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.smiier.skin:pushservice -
Acquires the wake lock 1 IoCs
Processes:
com.smiier.skin:pushservicedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.smiier.skin:pushservice -
Checks if the internet connection is available 1 TTPs 2 IoCs
Processes:
com.smiier.skincom.smiier.skin:pushservicedescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.smiier.skin Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.smiier.skin:pushservice
Processes
-
com.smiier.skin1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
PID:4314
-
com.smiier.skin:pushservice1⤵
- Checks if the Android device is rooted.
- Checks memory information
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4352
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e798a6defdcbda5fa03f99777165ca79
SHA1c0cef436554821171a3536736423a7b57be8673b
SHA2565924ba639702fb9fa9a722da81d3609598f84f5bca95ecfe1978377826f50f71
SHA512b86480770b05e345c9d804ed84d93cfbe0b9f04b183bfca1d5ce6c82b7cfb0187e736bef46750e8ade171b7311154659c9ad05db16eb1abd8286a48a85d75300
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
80KB
MD569523ee048f23d92029e11c125f894c9
SHA1c550fc29bb9737a2852687b4079b28c780fde8a1
SHA2564ef403da54309356542f890032d98ba001c47bbd87360d0c7aa0efb581b9d5d5
SHA5123f01aa9c2a222d1a6a185a5449455dfcc16005e5ec6c95a741968adc864d0276877c51aa67cbc7b568b6323c94d686877495283fdcdd15f46d04a1a0e61b3339
-
Filesize
121B
MD59bf4d95fa506e45d72e18c53f5061ed1
SHA15e83ef04a20d7e1d909afd0193679cd4052d9767
SHA256746d63f1fb2b6f79f66cb46a2b597fc91ebebc340ad9c5e8200665312e491733
SHA51252d168e752f26c8c366cab21f7336e7ad3fdf7ae5ef387ec022ae941cecc87da899bfd1e864d47d1e5ff5131c73ed66816935f9c5b780b85e6deef965c1a5c11
-
Filesize
31B
MD58c92de9ce46d41a22f3b20f77404cc1d
SHA18671a6dca00edb72be47363a7071be65cf270373
SHA25668bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274
SHA51230f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56
-
Filesize
2.6MB
MD5384af309e8436475716b02502908e590
SHA1c5cfd9968dff755519e647ab67de97bd4a0ea678
SHA256f58ae8fd601660b71d54264aefc85ad73c1c1f1365f12f4d433f7310ea0cf965
SHA5120b8419d4feb13c4ab8596de659fbc839d02ac763b6f6a5af893d8b916380c4cfd5b5d01236bb7fd520e1969f512f7db26f34448abefe1d2a72cae157bfcc0b9c