Analysis
-
max time kernel
179s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
26-05-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
7459870bea7f71e8f7d703e42a5eed97_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
7459870bea7f71e8f7d703e42a5eed97_JaffaCakes118.apk
-
Size
5.8MB
-
MD5
7459870bea7f71e8f7d703e42a5eed97
-
SHA1
8eb521d09b085f79e17e6f9a442b518b65a3baef
-
SHA256
c3228a494ef3f547d76374172a9bfe359e2e372e638f447af981598ba49d7b1b
-
SHA512
3489479d6a53f59f4d81364ef4f8cca1ce4c919900bd50e35052c983e0c441d48c4a3acf0bdddbeeb534b521a0464fee8a711e17afe70305ed8952a340b5798d
-
SSDEEP
98304:lDXiMU94bq0iBegxvOMY/lowvnMGE3NV72yUMrlCJ8YOaPDQQBYuYBVXDaSIDA+c:lDXip4OcgLwYH7RtSi1QBYVHXDaSIDNE
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/xbin/su com.n2190679935.eoz /system/bin/su com.n2190679935.eoz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.n2190679935.eoz -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.n2190679935.eoz -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.n2190679935.eoz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.n2190679935.eoz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.n2190679935.eoz -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.n2190679935.eoz
Processes
-
com.n2190679935.eoz1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4296 -
getprop2⤵PID:4471
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4495
-
-
ps2⤵PID:4528
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4559
-
-
ps2⤵PID:4627
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4646
-
-
ps2⤵PID:4681
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4701
-
-
ps2⤵PID:4733
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4752
-
-
ps2⤵PID:4800
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4823
-
-
ps2⤵PID:4855
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4873
-
-
ps2⤵PID:4903
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4922
-
-
ps2⤵PID:4955
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:4973
-
-
ps2⤵PID:5003
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:5021
-
-
ps2⤵PID:5052
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:5071
-
-
ps2⤵PID:5106
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:5124
-
-
ps2⤵PID:5155
-
-
chmod 777 /data/user/0/com.n2190679935.eoz/files/GizWifiSDKDaemon-04.16101912-x862⤵PID:5173
-
-
ps2⤵PID:5205
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5d039ec9556b48dd66864bc5f6c4a459d
SHA10f371531ad7fa290a5baec29b01da5583ab5bc33
SHA256d6707ca0edfc3e6d50e1b5b4649a4dfef4d2640e0d4e92f5dd733ffbca534c00
SHA512b8e99aa360e7086a855cfee7becc31569eb94c20565a15c84e309b96fe5d58a8c4589e7d46aff20175bff002e1f338f5f2a6968944761335a6f43278a028006b
-
Filesize
8B
MD5de2b14ae7499f90736fc4a92327553a5
SHA1843c4a11660fe38ea61e6960a29d4f4796da6488
SHA25601666ec060466c14b9fa06c613fbac449163f2a2017558fe16526209ab78c6b0
SHA512c46f6204075636e89e9241c32ec6e03d04884d08d5aa52abaf3b0bb8eb74d60a24145c7fd9f97f5fd0300a602e575a9a689b95cd68ce3eccc8b6a4aea1975db8
-
Filesize
130B
MD56d30059fcff591ac9f7b8f28c624e63a
SHA1cb541f1486418eae07668b8f1683d585038b347d
SHA256a60ec557b4e53db80493cebce1ed149e7ae6b6e156d2a6a9c9939ed3fa068e83
SHA512348abbf8998ef028ba3a9dd8877b93c370fc0349e35742d4824e9272980ca69e5fda8e949bf4ee83be0337aa40599095579db042c029819a68c9a14edf6f9188
-
Filesize
7KB
MD5cc0a72712a88936ba23e535629329b10
SHA19e96a2cb5980257663be7fbf2bd1714835ba5e4d
SHA256722a3036a72ff4075331be6cc272e7b5b00b752c576c57e951e4c2f706f5f220
SHA5121cca5a8b0bf9ebfd9295bbd464af5285b1c7984f09fbfce19e0c61a3e64c731d8f96478fcfbd7dadf73b7d0f4f5befa0e1fcff7382ae87d6217686d90fa65724