Analysis
-
max time kernel
179s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
-
Size
28.2MB
-
MD5
67f53b5ce8611b198696c0ff90b7af2f
-
SHA1
ef9c00f58468c8368a9d9cd8a7eecaf9cb74ba89
-
SHA256
9f740f088b365f3a831c602e4c2435293edff0d801405545bd22f73508754ef6
-
SHA512
7e22ee0fc6ba68be2941037ae0fc78a0076f5ebeabbfa04ee0751e6d1a51d682b1e5fa9270fa21c632a0a005cb1b5a30a443a218bd37484842d0ed15d85e11d0
-
SSDEEP
786432:DgBxMCmOnTmRR9V9Mpiyh3iTl4WQr77VUYTAm:DgvMaTORD9tw3iuHuYT1
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar --output-vdex-fd=215 --oat-fd=216 --oat-location=/data/user/0/com.mmpgaame.bddr/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&com.mmpgaame.bddrioc pid process /data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar 4566 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar --output-vdex-fd=215 --oat-fd=216 --oat-location=/data/user/0/com.mmpgaame.bddr/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar 4256 com.mmpgaame.bddr -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mmpgaame.bddr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mmpgaame.bddr -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.mmpgaame.bddr -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.mmpgaame.bddr
Processes
-
com.mmpgaame.bddr1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar --output-vdex-fd=215 --oat-fd=216 --oat-location=/data/user/0/com.mmpgaame.bddr/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.mmpgaame.bddr/cache/1582435991586.jarFilesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jarFilesize
20KB
MD52048eb6124a452540ee51dae4145aadf
SHA1d05005b2cd7fe4cd652b0d7fd1bdac2c19d51451
SHA256105c54b6fe3f25350e92187467761598e4c21d62b1091b77d091f65f3bd98864
SHA512bb6cb3853dd2a5d0701e20607d4e153ae201268dd2e5e2d06cc2df208b3b4dc50132a4ab428251b1644d2399fcc717662438d082ff14203387bab8794109d44d
-
/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jarFilesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639723900000.05f402d0/cFilesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639723900000.05f402d0/eFilesize
110B
MD5ce2fd8389fa89788f12929ab2f45c1b9
SHA16a6e463545b1a52e1091fece481f9533bc7f9ae8
SHA256203f97f45bfe9e3cb0e88b4d23ce3573b5c30e4c1c4b860850092490e1ab5c3d
SHA5124d6b9f4e54a718551fdb34c164b55267a82189eb018575b18666bfd2a7ad184e91278923880b2ab45f32096c2dd4cd5fefd2b1c271c687a72236a4b289e6281d
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639723900000.05f402d0/gFilesize
1B
MD5c81e728d9d4c2f636f067f89cc14862c
SHA1da4b9237bacccdf19c0760cab7aec4a8359010b0
SHA256d4735e3a265e16eee03f59718b9b5d03019c07d8b6c51f90da3a666eec13ab35
SHA51240b244112641dd78dd4f93b6c9190dd46e0099194d5a44257b7efad6ef9ff4683da1eda0244448cb343aa688f5d3efd7314dafe580ac0bcbf115aeca9e8dc114
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639723900000.05f402d0/sFilesize
356B
MD53012d95ea70877736a32ee116b6808a8
SHA151098f2aa8c6cd9524bf666f06bab439d0e044e5
SHA25629d764d06ff6228ae1b134db75f068b519fe6f46151f52637fdbdfff7fc7c411
SHA5120087d115bc7c4313c8fddc51f9b9cb596912efdb7ec614e2f28c621d68442a2907b6d274a9ebfd87cc41c69595805042896a8fce974cea4c4d1dfc420514f8ec
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639723900001.05f402d0/eFilesize
130B
MD5332c7ac86c114a4d0e50f629eae43c39
SHA1c339946ab0c0dd9ef918bbaee668c7da7c8c9830
SHA256dbe6978422c69a70ff42abe68c674412ad2fe320f54638d60631d8e0667c139b
SHA51251a0e0f7ee5f17b440f6cd2135144b38039b552a2e5e14ced2f17746fb0fa8bdf4a375c8a6bad7faf98d8bf27347da6318857fd0ba18239821f94e8e5744dbd4
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724000002.05f402d0/eFilesize
1017B
MD538919af1e670cc48ab3d6a874a922aca
SHA1ce69c245b9bfd5250ec610e6df16ea8557b7e30a
SHA25610b69743bad4e4d21a5bad941ef4ec118687b16e89d7fa975e259147d56449c4
SHA512339ec53de8657a63c03c3632db0d6b2e521ff2e08b9a670745a6879abc93f2f5e6ccb116eadf03ae1384347afe02c8b1d0ba65c3d158203caa7be1d2571aefd2
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724000002.05f402d0/eFilesize
1KB
MD5a7982815ab0f77b5fa13a97a6977fa35
SHA1256c46644681a01b1290cf0513fa0acaeec4d83f
SHA256c85d2af6df154975e0a60c483302d336be94c9a1883deb700377c1392be7dec8
SHA5124a8b50b3eb59295b936eafd6560bf5a702e54999567cfb3fa8eea9970dd63e5abc064f833a5d34b70eb681d8566d8c7583bf47b66127efc720549fa9a58a7933
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/configFilesize
293B
MD58673a8ac0b06a9d056d08d62f857ba4b
SHA1a351bea1932270bafbe468584058fef20dcfc31e
SHA25683b3f90c4edf1f122c8faf9784ca0aee4dd017c65493ac181c1814211703db96
SHA512edf28eb7fcef654f139285d308f817ee230d6f064a4c865109d6dfe6f73c11f8f35737c8159c8a302118237ab980899ba5773f547cc9da4028643a53b08e324f
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/valuesFilesize
130B
MD5d27e73da6f479bc66bebf77efa39d4e4
SHA1031e5458b5123dd690505e0806387978e977a3f2
SHA2564a2fd6d88cdc576b4faa1d8ec09e3f9b4beae84a04e727eca8231e8c397631b2
SHA5125810b80dddde96cd806e7c883b42d43e3d7ce9b0b8a43d0625b3ed9630225e645a5dc8cf00d51dc9f54e712492e7b711fa9083a7df32f753f6dd48e621456b38