Analysis
-
max time kernel
47s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
24-05-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
6e2e6d7c57a2dcb9699a034e33fa39eb_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
bdxadsdk.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
bdxadsdk.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
General
-
Target
6e2e6d7c57a2dcb9699a034e33fa39eb_JaffaCakes118.apk
-
Size
12.7MB
-
MD5
6e2e6d7c57a2dcb9699a034e33fa39eb
-
SHA1
33b09c087ef7d2b0fe65db6a0e2e162838a798c6
-
SHA256
4f729f2722e1e27fc937cd151c283c3b9b9baa4808c5a292f2f7f07c487aa35c
-
SHA512
68141a7648b4f9177e7fb23f7f048a7a2c9dd52a51aa64ca9497a35c8a4e500bfece89c9601565166f7e28a4a9c51e429b466f84e01052fa16cd21080bea4bad
-
SSDEEP
393216:6AfNc83QqXjifbdsia9n9L3bWu9+fx+vGwS1120p9s:fN34sT9L3bW7wOwS1125
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
com.gougoushijie.appls -l /system/xbin/suioc process /system/bin/su com.gougoushijie.app /system/xbin/su com.gougoushijie.app /system/xbin/su ls -l /system/xbin/su -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.gougoushijie.appdescription ioc process File opened for read /proc/cpuinfo com.gougoushijie.app -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.gougoushijie.appdescription ioc process File opened for read /proc/meminfo com.gougoushijie.app -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.gougoushijie.appdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gougoushijie.app -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.gougoushijie.appdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gougoushijie.app -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.gougoushijie.appdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gougoushijie.app -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.gougoushijie.appdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.gougoushijie.app -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.gougoushijie.appdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.gougoushijie.app -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.gougoushijie.appdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.gougoushijie.app
Processes
-
com.gougoushijie.app1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4289 -
ls -l /system/xbin/su2⤵
- Checks if the Android device is rooted.
PID:4459
-