Analysis
-
max time kernel
137s -
max time network
182s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
67b55327532cf14c5af969c50b79380d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
67b55327532cf14c5af969c50b79380d_JaffaCakes118.apk
-
Size
18.9MB
-
MD5
67b55327532cf14c5af969c50b79380d
-
SHA1
081107798fe5202f35ea3ea18cededb5d65b7742
-
SHA256
1cedc13b6acb98d1957069a5077b31d526be87cc5bfe88edda3aa055ccddae1d
-
SHA512
46059fc2f94936f76e2e28bda248a6903eef3a20d9051a72391d0a1d760c43b75fa9b59546ef069155ae8dfb9b2fc0a27a24d5b0541176b11af3e6c28e2515b4
-
SSDEEP
393216:YyJBsLijqEcEllkQ34LVxHdBkjsioxfupoWCWTxuU9b9+baVbl5Jepym:Yy3s2dxllkKqHH4noWFTvbsUl5ckm
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
Processes:
com.DoomsdayStudio.LabEscapeTapTap/system/bin/sh -c type suioc process /system/app/Superuser.apk com.DoomsdayStudio.LabEscapeTapTap /sbin/su /system/bin/sh -c type su -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.DoomsdayStudio.LabEscapeTapTapdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.DoomsdayStudio.LabEscapeTapTap -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.DoomsdayStudio.LabEscapeTapTapdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.DoomsdayStudio.LabEscapeTapTap -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.DoomsdayStudio.LabEscapeTapTapdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.DoomsdayStudio.LabEscapeTapTap -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.DoomsdayStudio.LabEscapeTapTapdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.DoomsdayStudio.LabEscapeTapTap
Processes
-
com.DoomsdayStudio.LabEscapeTapTap1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
-
/system/bin/sh -c getprop2⤵
-
getprop2⤵
-
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/app_crashrecord/1004Filesize
249B
MD58e1945b8a317db203bd9053c12f88371
SHA16af83f71eb76da46a968f0d0b9f260944ddcb031
SHA2568a5267c33e0e8abc965ddf6d97b62242a26a60b0623ab4ed02dfa8ccd67fa091
SHA512b62cd1d73addc27679177b48c1f411d5dd3147c927b1deed733588945b6f63ed7b324bfced6bf4db7099d607872556a4f461924a4b36bacb2fa61db568332dc1
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/app_crashrecord/1004Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/bugly_db_tgsdk-journalFilesize
512B
MD54dc4447db50ee24239cb9967c3c29717
SHA1a45471c23acd44cb71f90f15b17e98a4b43fbca7
SHA256bef622a8b9bb9feb583e247eeff8cb6d938df5c7c6010d20f8344dadaa051e6d
SHA512df735123bc912252dc3cb38dc063378ed91ce8292cf6c7f9637bc6a4a9d07eb755e7b0d2e950866ffd5fb922b831f95f108dffc01842d67587aa034173197dbe
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/bugly_db_tgsdk-walFilesize
265KB
MD5bf597f59c45a2f4109448b553c079641
SHA1ffdc7fabb5f6e96f1e504f0901daaaef0a8c8586
SHA25646cd3e0415b2d6335bcc287f29025083f133f64515e89333fff5e167a6099fcb
SHA512f93a2e5cf839e35eb6935cc133afdf9bdf6adffe10a2653623dca3190d1e28f1c5e32afa92f0fd824546950cf5d12171be5cad7ae94a0891831166eabdb5b14c
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/tgsdk_counter.dbFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/tgsdk_counter.db-journalFilesize
512B
MD505ed4c13ad7f3258221309900a6ebf1d
SHA11bf086fcb79c070347ad0c395eedabbf18102fd8
SHA2561c67f01201a3b6e9d064a337aba39ac6b95421e4af0da6a5b68f37a47858a58d
SHA512870c8b1dc3e3b03523415e7f224965a02c54231577f4ea18e4ef9449e72af8a27370afa44f7e9a9123860a6efecfc60b2b4c51668848bab8b5abe0ce67c42cf6
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/tgsdk_counter.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.DoomsdayStudio.LabEscapeTapTap/databases/tgsdk_counter.db-walFilesize
44KB
MD50a99f5de8f80fe2ed597fec12ef1fc7a
SHA13d40ab0285ea84fbaa9ae0e0b0fbca5238e818c3
SHA2567d291a1762db6fb7e244b99c619709c4c8a6242e4dee77ae70562f85759c40d6
SHA5120657d2dc0ec175d0bb39452f2895417951078459cea6831b4fdad2bf7f1a2fe92f33e8f1effba7faa9e38bcf792071084de30776030f375c73e8305591904edf
-
/storage/emulated/0/Android/data/com.DoomsdayStudio.LabEscapeTapTap/files/Unity/f4289f88-f4a3-4588-bec6-094b2b06f197/Analytics/configFilesize
293B
MD58673a8ac0b06a9d056d08d62f857ba4b
SHA1a351bea1932270bafbe468584058fef20dcfc31e
SHA25683b3f90c4edf1f122c8faf9784ca0aee4dd017c65493ac181c1814211703db96
SHA512edf28eb7fcef654f139285d308f817ee230d6f064a4c865109d6dfe6f73c11f8f35737c8159c8a302118237ab980899ba5773f547cc9da4028643a53b08e324f
-
/storage/emulated/0/Android/data/com.DoomsdayStudio.LabEscapeTapTap/files/Unity/f4289f88-f4a3-4588-bec6-094b2b06f197/Analytics/valuesFilesize
103B
MD5ec00793b6ebf7b6b7ed43e705d233536
SHA12bb2db93be541559904d587ee8c7c38f0b937a8a
SHA2569767115ca963c2c9b043c963aa53526443fb3ac09ff46127b7cdae1eeca176c9
SHA512f032998585a51b26103c1e1aebec1096501e7d4cd3c1e57ad30762ff4d79f5af77693ff06e7394ef19e60e156e400f4b15e2158e3477090e9faccc21054b2d72