Analysis
-
max time kernel
179s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
22-05-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
-
Size
28.2MB
-
MD5
67f53b5ce8611b198696c0ff90b7af2f
-
SHA1
ef9c00f58468c8368a9d9cd8a7eecaf9cb74ba89
-
SHA256
9f740f088b365f3a831c602e4c2435293edff0d801405545bd22f73508754ef6
-
SHA512
7e22ee0fc6ba68be2941037ae0fc78a0076f5ebeabbfa04ee0751e6d1a51d682b1e5fa9270fa21c632a0a005cb1b5a30a443a218bd37484842d0ed15d85e11d0
-
SSDEEP
786432:DgBxMCmOnTmRR9V9Mpiyh3iTl4WQr77VUYTAm:DgvMaTORD9tw3iuHuYT1
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrioc process /system/app/Superuser.apk com.mmpgaame.bddr -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.mmpgaame.bddrdescription ioc process File opened for read /proc/cpuinfo com.mmpgaame.bddr -
Checks Qemu related system properties. 1 TTPs 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
Processes:
com.mmpgaame.bddrdescription ioc process Accessed system property key: ro.kernel.qemu com.mmpgaame.bddr -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.mmpgaame.bddrdescription ioc process File opened for read /proc/meminfo com.mmpgaame.bddr -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mmpgaame.bddrioc pid process /data/user/0/com.mmpgaame.bddr/cache/1582435991586.jar 5178 com.mmpgaame.bddr -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mmpgaame.bddr -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mmpgaame.bddr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mmpgaame.bddr -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.mmpgaame.bddr -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.mmpgaame.bddrdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.mmpgaame.bddr
Processes
-
com.mmpgaame.bddr1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks Qemu related system properties.
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5178
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.mmpgaame.bddr/cache/1582435991586.jarFilesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
/data/user/0/com.mmpgaame.bddr/cache/1582435991586.jarFilesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700000.e8231c26/cFilesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700000.e8231c26/eFilesize
111B
MD5f32086d8ea16ce84eedd0f2a9d233d08
SHA1e18e97389b5dccb2402059e6aa5e732e09aca153
SHA25644a5b1eba83616d04bd97964585147389ed5356448566e14b3686162f333a78f
SHA512e3ce0f5afbed751b958c79b69285af02c2f7faed7ce250e431b98d91200ca86c05e260995487732f1a6833f6bf6994fae2d31b6d125b46fb8d91668c3f525729
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700000.e8231c26/gFilesize
1B
MD5c81e728d9d4c2f636f067f89cc14862c
SHA1da4b9237bacccdf19c0760cab7aec4a8359010b0
SHA256d4735e3a265e16eee03f59718b9b5d03019c07d8b6c51f90da3a666eec13ab35
SHA51240b244112641dd78dd4f93b6c9190dd46e0099194d5a44257b7efad6ef9ff4683da1eda0244448cb343aa688f5d3efd7314dafe580ac0bcbf115aeca9e8dc114
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700000.e8231c26/sFilesize
357B
MD505c5217509dbe174ffb29776b8b3d2d2
SHA1f0d32a7bc9d024a13385a079fd6c41f89efa7d54
SHA256135041f9ee23ca64f9d247e2dc1117197efb282d28781a44d5638b52f0ff5f61
SHA512ddefb7c526805a728a272592cd759d62f10aeb63e0983ac1e2d349a67d3af6f026a8975b4f1f72c4066163f1385aa4ad1e429528db9f97c67260e52805dc42e3
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700001.e8231c26/eFilesize
131B
MD51330a229d564e1b0a3e4b805ac2ca973
SHA1eee203148e6d83ecc703aa2718c07e33b9cb4da5
SHA256177804505822ed3bf021bc8525938b1ed7a2b54949e44a4b453888427148436c
SHA5121be75de5c13d2ca6da5b6cecd5ea49c369d2a68fd31fef58e746215c6d8ac941e059b9371971ece385db03b9ad5f25486088f8b174b41c37148fe3917b05f606
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700002.e8231c26/eFilesize
157B
MD555c7d3c624dbc70ae2bc03ab29ab3142
SHA125031565d2502f9982bb30991b7eb7668321c468
SHA256f80509c79329a623ae2e6e1d5feff0036c895d0ef843e68b2de3da7b68df0eb2
SHA512cd15f22d934141fe87c6cd12b26e3514a87295e4b20001a369722ae38a7f35c2cfe58f203c1ad5389873ba38c32581a2cdb57315da16886dd42665f31c98293c
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/ArchivedEvents/171639724700002.e8231c26/eFilesize
1KB
MD5a034e6836b067daa23808e48c0b022cf
SHA15293547dc1d51fca2d239e51d9fd5e86a329e51d
SHA256fcb565dd5f06f3abec5cfd72dbb48797630ac3fd9b6bc7976c1e0de5f4680584
SHA512842cdc6500884f2f81ce834347ba6759cdede05fc06e8dd95dcd638bcb32aea4f75c19317c5d5f52527074dddb3ef66ed840fb544d13abdf3f4ebe5f18a51443
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/configFilesize
293B
MD58673a8ac0b06a9d056d08d62f857ba4b
SHA1a351bea1932270bafbe468584058fef20dcfc31e
SHA25683b3f90c4edf1f122c8faf9784ca0aee4dd017c65493ac181c1814211703db96
SHA512edf28eb7fcef654f139285d308f817ee230d6f064a4c865109d6dfe6f73c11f8f35737c8159c8a302118237ab980899ba5773f547cc9da4028643a53b08e324f
-
/storage/emulated/0/Android/data/com.mmpgaame.bddr/files/Unity/local.a8d5159e91ea94045a5d0d59bd077c6f/Analytics/valuesFilesize
130B
MD5ab70b4c349f3479307c5d15fd965e385
SHA1b4a3bf0b523cfd229d6e0049e3a3d1f092b379e4
SHA2564a8751f627df9a574346752decdf70210dc7e23816d1ddbf098f27e997af6caf
SHA51203eb10e5f04fc14a0823f663710a55351490443a4461a1ee115de7e9188eaf1b2d4d47c22132d322c31ea26f6c4433b07fd1f52713579429462b8dbfd2162654