Overview
overview
8Static
static
675b6cc22af...18.apk
android-9-x86
875b6cc22af...18.apk
android-13-x64
dmss_v2.apk
android-9-x86
dmss_v2.apk
android-10-x64
dmss_v2.apk
android-11-x64
elepay.apk
android-9-x86
elepay.apk
android-10-x64
elepay.apk
android-11-x64
rooter.apk
android-9-x86
1rooter.apk
android-10-x64
1rooter.apk
android-11-x64
1Analysis
-
max time kernel
179s -
max time network
187s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
26/05/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
75b6cc22afb9e6a876babc15340aa321_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
75b6cc22afb9e6a876babc15340aa321_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
dmss_v2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
dmss_v2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
dmss_v2.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral6
Sample
elepay.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral7
Sample
elepay.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral8
Sample
elepay.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral9
Sample
rooter.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral10
Sample
rooter.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral11
Sample
rooter.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
75b6cc22afb9e6a876babc15340aa321_JaffaCakes118.apk
-
Size
5.5MB
-
MD5
75b6cc22afb9e6a876babc15340aa321
-
SHA1
8f6ce10ee45f0989d3b770ea7aa4b79ba1f11ec0
-
SHA256
228a033466d0765370b477b13f0675a72fd10d931b39cc3e087f99374c812cf7
-
SHA512
6ea645bb20704e4e80cd6a7b992614890d2c400c7398c3e272c4b891d4011d24aa377e7385d9fb05be5485974eb2d3ddf011a8d69be14ee204a02142ad636bd3
-
SSDEEP
98304:bNhoZ1RJIDOs+CJV1MPPbFTsOZnQFkNWAdkL1JEAHbba2+Qs3t9vVXr8z:bN+tYlJXWFgOaFko+kL1bXsm
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /sbin/su com.qihoo.appstore -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks Android system properties for emulator presence. 1 TTPs 13 IoCs
description ioc Process Accessed system property key: ro.bootloader com.qihoo.appstore Accessed system property key: ro.bootloader com.qihoo.appstore:critical Accessed system property key: ro.hardware com.qihoo.appstore:critical Accessed system property key: ro.product.model com.qihoo.appstore:critical Accessed system property key: ro.hardware com.qihoo.daemon Accessed system property key: ro.hardware com.qihoo.appstore Accessed system property key: ro.product.device com.qihoo.appstore:selfupdate Accessed system property key: ro.product.device com.qihoo.daemon Accessed system property key: ro.hardware com.qihoo.appstore:selfupdate Accessed system property key: ro.product.device com.qihoo.appstore Accessed system property key: ro.product.device com.qihoo.appstore:critical Accessed system property key: ro.product.name com.qihoo.appstore:critical Accessed system property key: ro.product.model com.qihoo.appstore -
Checks CPU information 2 TTPs 2 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.qihoo.daemon File opened for read /proc/cpuinfo com.qihoo.appstore -
Checks known Qemu files. 1 TTPs 3 IoCs
Checks for known Qemu files that exist on Android virtual device images.
ioc Process /system/lib/libc_malloc_debug_qemu.so com.qihoo.appstore /sys/qemu_trace com.qihoo.appstore /system/bin/qemu-props com.qihoo.appstore -
Makes use of the framework's foreground persistence service 1 TTPs 2 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.qihoo.daemon Framework service call android.app.IActivityManager.setServiceForeground com.qihoo.appstore:selfupdate -
Queries information about running processes on the device 1 TTPs 5 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.qihoo.appstore Framework service call android.app.IActivityManager.getRunningAppProcesses com.qihoo.daemon Framework service call android.app.IActivityManager.getRunningAppProcesses com.qihoo.appstore:selfupdate Framework service call android.app.IActivityManager.getRunningAppProcesses com.qihoo.appstore Framework service call android.app.IActivityManager.getRunningAppProcesses com.qihoo.appstore:critical -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 5 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.qihoo.appstore Framework service call android.app.IActivityManager.registerReceiver com.qihoo.daemon Framework service call android.app.IActivityManager.registerReceiver com.qihoo.appstore:selfupdate Framework service call android.app.IActivityManager.registerReceiver com.qihoo.appstore Framework service call android.app.IActivityManager.registerReceiver com.qihoo.appstore:critical -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.qihoo.daemon -
Checks if the internet connection is available 1 TTPs 4 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qihoo.appstore Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qihoo.appstore:selfupdate Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qihoo.daemon Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qihoo.appstore -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.qihoo.daemon -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.qihoo.daemon
Processes
-
com.qihoo.appstore1⤵
- Checks Android system properties for emulator presence.
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4237
-
com.qihoo.daemon1⤵
- Checks Android system properties for emulator presence.
- Checks CPU information
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4269 -
/system/bin/sh2⤵PID:4398
-
-
com.qihoo.appstore:selfupdate1⤵
- Checks Android system properties for emulator presence.
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4322
-
com.qihoo.appstore1⤵
- Checks if the Android device is rooted.
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks known Qemu files.
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4376
-
com.qihoo.appstore:critical1⤵
- Checks Android system properties for emulator presence.
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4412
-
app_process32 / com.qihoo.appstore.persistent.CoreDaemon --nice-name=com.qihoo.appstore_CoreDaemon --daemon1⤵PID:4458
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5eb5700f6cb0d4fd8a88d939436a3ecf5
SHA15239565c4c565787c46e0f6254b2e7d81cdf2b8c
SHA256bbfcf860b1fd6f2d6b243a7992d81946a183e16c4b86e4b86b61dd05f717daa5
SHA512fa94a8c400f067694f4e2f7c979d1662a6b29219659d37d02742b866f5bece59660e19d339544bc25492320f4c0bd62eecfd3d7d18cd2f26ef982c4399aea4fe
-
Filesize
4KB
MD5c3e5f39dee68a7e6f888f5cb649ac513
SHA1c5d1b613206b6626959f042528caa31cbb65f093
SHA25628172ab79c841ed38819671e279a54e7df16bf688ec30587a8a207114fbcb15f
SHA512f08178f1336fdf4f95c6d4ad60effe998e2f7446bb0fe984a185ca859067d2ce0e4890ecaf2985b549d521602bc43a865f52e4d080ddfa82c7162204c028aaf1
-
Filesize
32KB
MD588b05ffbd3e53b505835170abb602155
SHA1a6b4ad385164a6baddc783f24a714885c7c51162
SHA256f849779203cf05c6c2f780fc51621a759e531122267c92d5876a50784b5ae1e2
SHA512e82d97596c05d0e0c20d19d15d52e926efb52b2d7bf9a13b1c8e993e503113398cc9f60022ee41e6e7fb223b1f05b375d9e9c99fba2b47f996595fc0c03f97b7
-
Filesize
512B
MD506cea3ab346ef206ab04e8d491dc2083
SHA154d17529c230874d16941c72b964a81c12e02f8d
SHA2563f5adc3f7a98e1155e1773e77db2a6484bb800ce2b7392c094f1ebe1c694bc5e
SHA5123ef10f20d57c6606c6b18cd3d86ff3c03e79a70ec57dea11dd14d94b34eee5b89a315ba724dacf38ba761836ea060adff4c56956ea5f6e2368cba0bcb1d0358b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD54118d96ae56f3c407d54d7c3a2e64572
SHA1dd33d242aec97af0103a4867585746d9e9bd9488
SHA256e09b83a1d287b3ebd7a61149b30964852e80001c71b4ee51886d98aa44e7083f
SHA51279d31cfbba88baf016c0bd1e1b8d031b0c702c5b5d48c5981a4184471ff4b2eba48de63133916d9a9ff4ce12cf0bb1cbe7b67670be8f1c63b10cd1ca7869ce51
-
Filesize
32KB
MD5b862d09bd80bb1bfb0c46f2f7e83807b
SHA14ea8352c904d14aa4ad909e389c305edcefab982
SHA256c82f927769e590ac7d5434b1a9cf9c6ed1553a1a60174de14be68f6e77ca1e23
SHA512e006072d347c38681f2569252a017a141ed426de9452cb0573b10e3b9dbdb99147b5b83f294553949b247bc959bb8fbac47ebbfe56c28fa763aded9c3d909255
-
Filesize
564B
MD5eec72b6e2aa79d3950b682c2113a1213
SHA17baa400c5258334a014a96b3d31c37a967f18814
SHA25699e823ec0e4376dbb63d6726e8ec1b9ad72aa53db979c1e34647e9e3eb531931
SHA51246964e7f10975d6f6b2a4f8962fc8c81b5a608128e41de6affeb673b6413a40fc9fc3619093018f7cacb4686d94fe3139ae8d8e9859833c620d417203b94ff72
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
32KB
MD57277093d3d55ea9007d07e2c026b769a
SHA1eafd452b451984e87d2fd51c3c1461585ba4cd83
SHA256a0dbdaaee54e15237f6b609cd5028180373ecb4bd91bec218b18ae4e8039411a
SHA512791a1006c2b0c27c4447763e8c5ac6baaba53fd8135be56de81525ad25a1483180b2d2c34668b4c4e083da9438b7ea90b9388b9d038f20b0d2a8c2042aac3497
-
Filesize
20KB
MD560e4cf217e77c56efd3707b603797c5b
SHA1816247b4883d3adb30c4db39fda16d2288e27de0
SHA2568e2b8343f703045fb8596dee1888f65fc66b64d10304a4a49fd4ad1f63bd67ea
SHA51222a8cd2974663e8caa220177e7bc64aaf35735dc8abc3870a7e47ea86b02d8b06b041000e5505039b3116290aee67e9645ad2d9c26218749f5b5b2e332712af2
-
Filesize
4KB
MD5b064ce25180516375f03ea7333ce2915
SHA193dfa1a66e89c7966a43bab0ee4e3124b005bf2e
SHA2569c53fb818e7f5a39e6eeb28a3e6fba95297410e6893db170de2972a53e6dfc50
SHA5128b02e12e242ab21405e06545a883e0f12486d7043379db67e5e3eeee1f0424274dfb892013d7acf0625560e7a185eba118d1e26cb8cf8c7943162bad220fad73
-
Filesize
572B
MD5cd90a367aef9a4ed7cff267e5d1ab9e7
SHA1fdda7f9724c9a222609bd406d525925c933a3743
SHA256f8d2bfe9f27e2d97aa891473abb3eafa3e10f6f79556aa7768f86dbc9a7debd2
SHA512e7a8bdbc87e4c0c35f9755dbb583bc076419889dd14fa2c1766ba5b2e18fcf35d952706b353bbcac122aa272ad597ece334c207a2544a3f9acae32ab8fcb4c2a
-
Filesize
544B
MD5b12b34d07934f7b06339282d0cde2c2e
SHA14713bfc2e4adc9508025a2996e90e366472da3f4
SHA2561ba59f72280a7254ebfaa761a7959580df1647f5aeff9df36ec5100e7ec26a43
SHA51238f9a748bfb3eb7afd697c2017d876309d5bd5a674faf2917b43ad5a4c0f7b3a353ec0eb6ae14ea2a8918d299fdb123a71455527c06e114863cf72e3e81bb9f6
-
Filesize
12KB
MD53fe30614d7e0d11db870b4624f6c50e0
SHA1053ff0fc621ab40f2afeddb3e7b4a73ee41ec533
SHA25667c532f0324228dd33b445cd399c1426e3a0e0cdc7b9358c66b402c5d40a838d
SHA512c7c09e97a408e88aacaf8099ad4d1fa604d58113393500a384eb3c2eb7c3c105af41314934b86eca2f088045cbab5a20d768bbb295448dc1ae6cb6c3f59821ae
-
Filesize
16KB
MD5a765efbd53be78de13bd9b9c1499acaf
SHA1a4088d55932fc041868585ee8e37c0b4c7a407d6
SHA2566894978a703e626e8e9f811b7664d2bebd56c2d168c4c76d1d4fc41049fa8e22
SHA5129779cbc93a2fb5ffe7dc39b3fb7241464f8af4b44c7ceb6a2a270dedc7063d23c73aecef01fc17e4adbef11acde51ccd5f255bda7a8b4f4f860b14c15b458d87
-
Filesize
20KB
MD57547845b9bc2e3535bbb1ccd3728c6d7
SHA13960a0ff86df385269aaac41003bb76366271095
SHA2567ea688984643a5b9ec6bb67ed74c2ac83c12ea0f24e4ad5eb2f2ee6ceb97d32b
SHA512b96f35788eed42962e022d30745e4a9e2ea64ff0e4387deae51d0baf67ce6381192e3a1ce1ce66fc177165ebe6a44eaca783874a945cd036f2a624603165428d
-
Filesize
32KB
MD5427f6e8e7cc962240ae2808905bc20a0
SHA10c20f1ba4cd4627ce08c23d271f13c6847ea33b8
SHA2564b18ab996717ab83d817c5927b030e080ddb7f4762cf162765ab6713c553aafd
SHA5124458b54bf0b6bd08df3f1d10abaff0c2a3d6f5aa939fea7746f60124bcfc6bf80a43825cc4a55450958c3f44618af7f0b3a42fafb59bfd57b6d49ea320b04653
-
Filesize
4KB
MD585a30e5eae31fa24759c59d5333205dc
SHA1bf0485beaa168742c6357b0327581f0f2be59972
SHA25601097785be42d8b51a0ee67816461c70d678aff335d8fb169e542f1f82ef9acb
SHA512ff19bd458014f02559a4471be1fc244d79e745e731e978837fd3c5c0c66be6fa4added78c88f9704f902cd2679b0a98f0aa142b7c4cac2770d22af033d591514