Analysis
-
max time kernel
20s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
23-05-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
692f0b74d1b32af24f14771af3bb43d6_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
692f0b74d1b32af24f14771af3bb43d6_JaffaCakes118.apk
-
Size
2.0MB
-
MD5
692f0b74d1b32af24f14771af3bb43d6
-
SHA1
30c4e2237022adb32ce400c08678923c72b59fd7
-
SHA256
9839252678e14aaae4b2a6a9c73c03d20567c9064ea6c87128d83c90b3b8688d
-
SHA512
2418a423efe0ba218752bbe1243e0bfcaa77310e75d724a3549bfea94837bf9cc0f44137a9f145c0032d9eb8bd3fbc87fd46eb2d27e7e11f767203a5f6d8a635
-
SSDEEP
49152:QgY1VQ8tzgrdB5p2cIJNN00Nme8IdzyQfG3tdB6hFkWbuvWd+O:NY1VQ8tzedDp2cYN00NHyXdB6hFhqvpO
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.game.cy.kuuhjbkdescription ioc process File opened for read /proc/meminfo com.game.cy.kuuhjbk -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.game.cy.kuuhjbkdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.game.cy.kuuhjbk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.game.cy.kuuhjbkdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.game.cy.kuuhjbk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.game.cy.kuuhjbkdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.game.cy.kuuhjbk -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.game.cy.kuuhjbkdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.game.cy.kuuhjbk -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.game.cy.kuuhjbkdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.game.cy.kuuhjbk
Processes
-
com.game.cy.kuuhjbk1⤵
- Checks memory information
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4292 -
getprop ro.product.cpu.abi2⤵PID:4322
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50f952f803263411e9acb4afbec4fb7a7
SHA16545cee14a2e2fa429c61d5d8f7374e27ca51b3a
SHA256ff662b45f353e00059d20b1441962e89d57f5eb55908278673b29f88ddbe361b
SHA512988c8e0f6eb2c3f0c97eac863181ccd0fcf4c76e40e21947e5c48e3e841ee62e1a8728adc43254c7207fbcf0ee36db6af891e433e43cd3daf6a822ef4496699f
-
Filesize
32B
MD5395e0bb0876f4fe7c8287fd1bb63d351
SHA177d5f6ec3af5edc081b4d30b4646b89368618708
SHA256afd8373139fb47562dd88b217ac5bf626c70383a8ccaf97693bbce5bf40a34dd
SHA5124b048f236f5200941e3192d23c058829fdc995a8a0606d47ef6f895fc56b42d2877e7f0363693d26149552665b31ab6057ad7b9e5aba3f44c47093b4250ae033