Analysis
-
max time kernel
16s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118.apk
-
Size
8.8MB
-
MD5
66d4f58fc8a6436c385a9f36869e67c5
-
SHA1
2f11a711643a3962b6e129486ed915e3658d26f0
-
SHA256
afef73f159e1c892bf1e5cbeaa4d3fc7f50c2f9acb787f2172feae0ee2ff2172
-
SHA512
085522b8516baa00fe05173777f69093affacc2fa728a25f5951ee9bb1cf1dd8a2e01f421aac0fe81fd74a077681d45868ad509c9e7467d116f4a05dd422f401
-
SSDEEP
196608:RutIy9+84h/Vj6odYbGSkYrktdaudMxwaRli1bKPi655/p+Gbpi:+J9t4h/Vj6HkYAt0udraRh17Uh
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
Processes:
tv.yilan.qianpai.app/system/bin/sh -c type suioc process /system/app/Superuser.apk tv.yilan.qianpai.app /sbin/su /system/bin/sh -c type su -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
tv.yilan.qianpai.appdescription ioc process File opened for read /proc/meminfo tv.yilan.qianpai.app -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
tv.yilan.qianpai.appdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo tv.yilan.qianpai.app -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
tv.yilan.qianpai.appdescription ioc process Framework service call android.app.IActivityManager.registerReceiver tv.yilan.qianpai.app -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
tv.yilan.qianpai.appdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo tv.yilan.qianpai.app -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
tv.yilan.qianpai.appdescription ioc process Framework API call javax.crypto.Cipher.doFinal tv.yilan.qianpai.app
Processes
-
tv.yilan.qianpai.app1⤵
- Checks if the Android device is rooted.
- Checks memory information
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4310 -
/system/bin/sh -c getprop ro.board.platform2⤵PID:4392
-
getprop ro.board.platform2⤵PID:4392
-
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4419 -
logcat -d -v threadtime2⤵PID:4492
-
logcat -d -v threadtime2⤵PID:4505
-
/system/bin/sh -c getprop ro.miui.ui.version.name2⤵PID:4535
-
getprop ro.miui.ui.version.name2⤵PID:4535
-
/system/bin/sh -c getprop ro.build.version.emui2⤵PID:4560
-
getprop ro.build.version.emui2⤵PID:4560
-
/system/bin/sh -c getprop ro.lenovo.series2⤵PID:4586
-
getprop ro.lenovo.series2⤵PID:4586
-
/system/bin/sh -c getprop ro.build.nubia.rom.name2⤵PID:4610
-
getprop ro.build.nubia.rom.name2⤵PID:4610
-
/system/bin/sh -c getprop ro.meizu.product.model2⤵PID:4637
-
getprop ro.meizu.product.model2⤵PID:4637
-
/system/bin/sh -c getprop ro.build.version.opporom2⤵PID:4664
-
getprop ro.build.version.opporom2⤵PID:4664
-
/system/bin/sh -c getprop ro.vivo.os.build.display.id2⤵PID:4688
-
getprop ro.vivo.os.build.display.id2⤵PID:4688
-
/system/bin/sh -c getprop ro.aa.romver2⤵PID:4729
-
getprop ro.aa.romver2⤵PID:4729
-
/system/bin/sh -c getprop ro.lewa.version2⤵PID:4757
-
getprop ro.lewa.version2⤵PID:4757
-
/system/bin/sh -c getprop ro.gn.gnromvernumber2⤵PID:4782
-
getprop ro.gn.gnromvernumber2⤵PID:4782
-
/system/bin/sh -c getprop ro.build.tyd.kbstyle_version2⤵PID:4806
-
getprop ro.build.tyd.kbstyle_version2⤵PID:4806
-
/system/bin/sh -c getprop ro.build.fingerprint2⤵PID:4834
-
getprop ro.build.fingerprint2⤵PID:4834
-
/system/bin/sh -c getprop ro.build.rom.id2⤵PID:4859
-
getprop ro.build.rom.id2⤵PID:4859
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/tv.yilan.qianpai.app/databases/bugly_db_leguFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/tv.yilan.qianpai.app/databases/bugly_db_legu-journalFilesize
512B
MD5a3aa8e2b3c23d9372f7682eaa91cbd7e
SHA1272bafb9f348f64dbcac26188abed19af3fab1e5
SHA2566871e048bd82dae436de70f407e149ac4b37cef698c54537c3e491a023d08d66
SHA51290175da6abb2d5a1bd90dd2cc9c13d80a4f95817df73630668468b0833a28480a70ecad7951364c26f07901ee130178415388e89c8244ed9b200713a08ae10ec
-
/data/data/tv.yilan.qianpai.app/databases/bugly_db_legu-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/tv.yilan.qianpai.app/databases/bugly_db_legu-walFilesize
245KB
MD560c0d6ea9b12b4c90739011fe589e84d
SHA1d2f19b4c2b121511790fce5cbb1d70602d9c959d
SHA256750e47086ffe402cf0219a4a0b8a29b470835f70762bc9d8aa879f55360955a6
SHA5120e53d06f892c35510eb018cbd219468f1d997be90ae62f5bd4c48a078508e86a2f4edaa9d95db08fd3dca9cabf0b223948db5d98d09de21b2884a32cb9e01db1