Analysis
-
max time kernel
155s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
27-05-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
-
Size
4.4MB
-
MD5
79a76edb82bc0d6f4d66e34f56e4022b
-
SHA1
87e29564f1b08b451c8f5b0ca6e51f3c3caae402
-
SHA256
b5ee5dd9f0cb2828251c387bf1c1f333da706b66b53972ca9b140259bd4219e9
-
SHA512
0f020a323f4da67652423257a28437a4ee18024d0169d77ff0673822aec86af8680de3fba345452650d6dbfe05d8342915c93f74bb1d25c966aad741af299ebe
-
SSDEEP
98304:VL3poecuT4tkt/Ps+2dyacf5m2/wYomLN7q2pYs:VL3poecu0tkt/Pd25cf42/wYomJm2pYs
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
greenway_myanmar.orgioc process /system/app/Superuser.apk greenway_myanmar.org -
Processes:
greenway_myanmar.orgpid process 4646 greenway_myanmar.org -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
greenway_myanmar.orgdescription ioc process File opened for read /proc/cpuinfo greenway_myanmar.org -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
greenway_myanmar.orgdescription ioc process File opened for read /proc/meminfo greenway_myanmar.org -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
greenway_myanmar.orgioc pid process /data/user/0/greenway_myanmar.org/cache/1582435991586.jar 4646 greenway_myanmar.org -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
greenway_myanmar.orgdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener greenway_myanmar.org -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
greenway_myanmar.orgdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses greenway_myanmar.org -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
greenway_myanmar.orgdescription ioc process Framework API call javax.crypto.Cipher.doFinal greenway_myanmar.org
Processes
-
greenway_myanmar.org1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4646
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
Filesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56
-
Filesize
28KB
MD5d92935cda043d816ea5eb716a76e2905
SHA163f962205f78163f25ba10d460089781e97405d3
SHA2568ad81f83f74b3491dbc5ac6a4ef08e76f3d1562d584ccb79ec63971adea7320e
SHA512b861a9fd25897f199e5327941f60f87368fc6ddb9ee963d499f6420cce153450ca68ff49ef9a478311298d0d2da752834f6562ec9335f01d14483f9d200bcf23
-
Filesize
512B
MD58fb7e8291778b9cb716dac0666f694f8
SHA1115380c0e285e813130403d606a52e24f5cd257b
SHA256eb3baa27a33ab1534d14966d06527264e40cf1fb778f651341dcea9e97f583b8
SHA5127422caa72dc7555e94e50ef6d96fc99604d774c0181c3992052e695c303dc1f3e9dd3931d8ee450b90e3ca8730a5b09f68bde8c61030ec117881ab415577f257
-
Filesize
8KB
MD515aa4ea8dfb5849344026cc310f689fd
SHA1abf925d194dd09d7a41f2a16e3a6dd84d34a4723
SHA2560610d7657d915b40e2dac7d971fce4bc12706a9c4b4db932f79bcc8938b3298a
SHA5124d44d0ebf15598b241922a7f110b27bb4336e3f2019bac167a04b093d5c59bbe7f8eb98cc2b9f426b917174545403cf59f488e5d1adaf0c56b5647242f8be09f
-
Filesize
8KB
MD50283385dded0b27c287a833311ce734e
SHA103d3f9148acde8e456fc47131c39f7e716da95ec
SHA256faaa73e86e1ec0d8f58d31107d874d27b6a65a5f60b95f394c3ec91ec2ab617c
SHA512563472eef2b82683c32cda8a649eff72ba6ae582f05891450dd53fee4e61702886a02b0477a038acbd357cf38ec2a34cb8cba38c77a1191cbe239ba99ef73f90
-
Filesize
36B
MD5927da81f18da1c46404bd3ce064deb28
SHA12f5a6758ee584495508afd7dca1d1cf3406b43bb
SHA2561777098a02336a0ae8e5482a35e1a4462233a74ed0c427285335d96182172f01
SHA5127c8f908d8742a7766fcece0a4647f8c6fdf31d5c7ffd9f2aff71d383a4765e3a6327a3af00dd93cc987f652de9862542b81514e20918aa5730d984e71395e4b6
-
Filesize
354KB
MD58ee1e715b6b2757be250911db3721c1f
SHA169c8458dd02820be4ee04e0647e82728ae458ef2
SHA256413c7e4847a159701fb1c03e4718cc7633e606041d6d901046bb08e76199b1c2
SHA5126bd940da64b0d34563ac456bd374d1fbaee059b91217de28dc4185116a505888d5cc132a71e8b4c42f4a7266ef099555937c6442cbd9a58308caf25c2c30a79f
-
Filesize
631KB
MD53e2c71529b63308b1bb39d36d3ead38c
SHA1335ab4d6504e54a49f839aa9696cb82933b152e2
SHA256803bd0b3847baf5cebdc00a8a49a6bca22c72469c3aefdcf3c25315ef88a9f78
SHA512a9b7de9b7fe5c23e14bf273f2d322e448c494b4a73e430ee3f667c744b40f1ba1a6b604898f107b91290fd56d07781530f36a34e49231459fa213e4de890019f