Analysis
-
max time kernel
128s -
max time network
135s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
678c794b6c5bc169182f9e3a7f6cecb7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
678c794b6c5bc169182f9e3a7f6cecb7_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
678c794b6c5bc169182f9e3a7f6cecb7_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
678c794b6c5bc169182f9e3a7f6cecb7_JaffaCakes118.apk
-
Size
2.2MB
-
MD5
678c794b6c5bc169182f9e3a7f6cecb7
-
SHA1
d4d0167038d64c43896346e0329f8d59032b4615
-
SHA256
12e356a4ff1f52b12c80865a67bf1e846bb612ce02a55f64682fae5e12d845d1
-
SHA512
b7b23d347a195b13c8b632dd8383ec4094ff52c8f27e5bae2d9e07d178e7166a35febada4ad8ef12e9c76a252358ffe4a8302ee737d6b297b6622c0d20967d97
-
SSDEEP
49152:njmr9lxBRb49f7Ux60pcHvkc8x9iDkmdD6mT3pJyOHEB7J8fs:nSjxBRk9f7y6lHv18qk46mbyOGf
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.androidbox.astjxjwqnull -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.androidbox.astjxjwqnull -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.androidbox.astjxjwqnull -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.androidbox.astjxjwqnull -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.androidbox.astjxjwqnull -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.androidbox.astjxjwqnulldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.androidbox.astjxjwqnull
Processes
-
com.androidbox.astjxjwqnull1⤵
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.androidbox.astjxjwqnull/files/mobclick_agent_cached_com.androidbox.astjxjwqnullFilesize
113B
MD539e32c1f56cf09cd09586e022e044c0f
SHA137a21ad332a71e02291909b0826409925b601ffa
SHA256ad75b425346edec6519a964cf1df499331e2e397c943731dacbd4296ff156d97
SHA51214dd06a58174438dddf772d93e849b5a61e1fc530d57a404182baeb013ef8f12b6a259e46109318188841adaa5359100c81fa869a0b6a08b29bcc5399b61ac54
-
/data/data/com.androidbox.astjxjwqnull/files/mobclick_agent_cached_com.androidbox.astjxjwqnullFilesize
212B
MD59aad575d23bad3ce712486b6305e3b46
SHA1cfe9276e2ab56013af6423830f19e3185416c8ad
SHA25633df7bf35c4b34c72452a39e8e94f8c5c1d65429f088be2f0cda6a00c20cc098
SHA5121d6ab0082cddcf3f5c0ae7dcc4fddb4c884c17236ac15215bb41474ad5466b96f32b3c183e1d4c66f1e0ada9d9e1670787c0b3d0c85ccdd08af6242dff877969