Analysis
-
max time kernel
7s -
max time network
169s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
658b3a879bf62ba834c9f88584b3f75c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
658b3a879bf62ba834c9f88584b3f75c_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
658b3a879bf62ba834c9f88584b3f75c_JaffaCakes118.apk
-
Size
2.0MB
-
MD5
658b3a879bf62ba834c9f88584b3f75c
-
SHA1
f88594daf606bd4d02cee20e70794eb744d8c229
-
SHA256
8397963b67b7c9407686038333c665852d53c8e817c6fbbcd3a3a92aab4dd71e
-
SHA512
d433f66f97f116085e20021e0c2a2beb0e6d11be5a23ba5f3d42a84e12bd065ce47179c758f16ce27d9a39d586b24b37ccaaa7f985d2233bd36e3b40a564f2e3
-
SSDEEP
49152:YnfRTi71fZR7h9AyJAULvsegiW0Hz1YfL+bmEwMF0ifd1llS1SyI0HjsfigVGk1:E5m7fBnAyJAULvKZ0T1YfL+1FF0iV13n
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.s.position.x1ioc pid process /data/user/0/com.s.position.x1/app_file/gtrjf.jar 4250 com.s.position.x1 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.s.position.x1description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.s.position.x1 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.s.position.x1description ioc process Framework service call android.app.IActivityManager.registerReceiver com.s.position.x1 -
Acquires the wake lock 1 IoCs
Processes:
com.s.position.x1description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.s.position.x1 -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD55ad5436ca1a2f67f11b95983b013288d
SHA176929358acfb22aedf8e0bb7f63ec7d10d7b7450
SHA2561b7b0efda5f25ecd04b61972bcd47a2318d3424bb35df2c41575b4b184109b2a
SHA512dd998156e3bdf2226b60c15b35a022dbadec07a333e99aa0ea86a9b3aeb474e065c7e473bed2eaaf087caae4e19fa40aff88b20e217d5686e82df7236fbeb2c9
-
Filesize
303KB
MD511b05e8f4f146054cfadcd6181e70cbd
SHA109553f37c711457ec2f9c0f94db58707d430feef
SHA256c8db79d55d393e827fef72438228aef7dac71045598a4ed1fbba8357ddd365db
SHA512a801edd841f9f2cfd191fc259504151b69be1ec669e58251b3cf54a4c90d3e558747088c7b4ad7fc461a5cc920b5d9ea21e5d0857558b2712f7acadfcf4a1db2
-
Filesize
28KB
MD51d10217da194f42e96417c2748a3a537
SHA1d6b5d385e2f978b9af759438f854612e4ebf9cfb
SHA256e60a83d228a87a5d02eafeb1b16133def9d75f35f1dcbd6cf08c2331b39a1199
SHA512080d5b06cef75146deb81ba53f5e805b3ae6821f778faa42451b5578f4c660db119bc90274986f7e3ddd92e8761fdaa9f6dbebc74d2b428e7810006e8fa0c4b3