Analysis
-
max time kernel
178s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
28-05-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
7dd5181629ee77cf45b6af55bd2ebb1f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7dd5181629ee77cf45b6af55bd2ebb1f_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
7dd5181629ee77cf45b6af55bd2ebb1f_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
7dd5181629ee77cf45b6af55bd2ebb1f
-
SHA1
ae9752ab25d7da22df0668650749d0ca167cd9cd
-
SHA256
822ac55a505bd34b021246da52e5009faa43a4925fe127a5f5fe35ced9d23562
-
SHA512
680eb3dda3b67d9f13a2c333b237be0026f967d9ec034a812e063b0877c899a163ee37236383858c4dcc15790a9a442740295d9197190476dea9782af4c90182
-
SSDEEP
24576:poL0otaYtXMhes8X3lUKfcfIkuovSp0Cjjo+9UjtUDq/13tdHbZKm51Ob83C:iQ7YtRX1wvTvSp1jvSjtUDq/1XHNKmje
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.xdzp.dpbp.batddescription ioc process File opened for read /proc/cpuinfo com.xdzp.dpbp.batd -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xdzp.dpbp.batd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&com.xdzp.dpbp.batdcom.xdzp.dpbp.batd:daemonioc pid process /data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar 4241 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xdzp.dpbp.batd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar 4209 com.xdzp.dpbp.batd /data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar 4276 com.xdzp.dpbp.batd:daemon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.xdzp.dpbp.batddescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.xdzp.dpbp.batd -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.xdzp.dpbp.batddescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xdzp.dpbp.batd -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.xdzp.dpbp.batddescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xdzp.dpbp.batd -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.xdzp.dpbp.batddescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.xdzp.dpbp.batd -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.xdzp.dpbp.batddescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xdzp.dpbp.batd -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
Processes:
flow ioc 35 alog.umeng.com
Processes
-
com.xdzp.dpbp.batd1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4209 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xdzp.dpbp.batd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xdzp.dpbp.batd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4241
-
-
com.xdzp.dpbp.batd:daemon1⤵
- Loads dropped Dex/Jar
PID:4276
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
549B
MD595251417c11881b2ca8fd5200e3aa796
SHA1599f258c5747d343cb765a9b40e84db769fbb2ca
SHA2565365e59aee2d8b7d771cef4b675c1a47c74375330aabc9a57c8fe61caf8e965e
SHA512a090eaf72f51723cae34e940bdc0a426e8b60b03de2cac9b24ce4ec9cbca1cb543ad04116fed104423380fa1e61283a17d151b609cbdf0d629a5c699546b8d09
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5db247317fad47e814a099828318f605a
SHA170bd9ab1d87b518fa3215b3bbaf28769d2882bad
SHA256278572077fdd7f9f3a041f88a50f040b9216d32baf0951663bd363f69af57307
SHA5121aa1250f71ac1ec3cb5dab5416b8711161d1cd094f38bf62c9d08a7edc1cbf8458da8fce739dfc3d7ec16b7774fb4c137495edac3d2093c14c1e8131182bae66
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD5a4bd3d21b0c342c4941fecde658f223c
SHA16b79c4f5689fd3df26e9fef63b13354f8ecfed86
SHA256bb68e60395b9553cb0c78c5bae35ceeb26a3cd9b42877083c326bb371e9075eb
SHA512b2fc6df31feb23e987fac454e2471f17cca2802b89630cc0782581f65b8321362b7d28bcbb9dee78fe3717e965d456c8e0a2ec75753c1852e838734f676becea
-
Filesize
1015B
MD5228ff7b611f6175932818accfef3a466
SHA1de3600d42345467dc7e937585e5091f51fe35868
SHA2561c27ed798bb2c9d062f6ae4bc3d66a517c58015d601bb2bd43fa6c8c2893561d
SHA512b398b00714769b79321f7c9e2291883fb6f19a51a2fcac1be4312570b733b92751d1b566a98264a41970669b77d5580c403a5b08f6a2a43d3895d4f8c24cadee
-
Filesize
1015B
MD5176acbdb25f36ceca1e2562a5e7f3ebf
SHA122d2c9c807964d85aa86fc4d21003bb10c8daaf0
SHA25683facb4c8126bf2d7a4f9909ca20f5e9542496055a9fc75d8ccd95c375977805
SHA51224ff42ec5344597853aadef48bacc9952cc8c3b88b6fe65c1be5b97d35caa7fa7842606f8afbd9262f2709328edc54f62715f1db103cd1803badb2e674043184
-
Filesize
162B
MD55057e61cd6edff4a1855a5c715a22228
SHA17532365541df849873ad452e9c86d92a6c3a341c
SHA25616b222e3e2d6a6278825597a42c748aba6ecb5e0f3953e3aa95f2fefb935f184
SHA512d434c4b23380dcda1affef14fbfd67843eafbbc69c841ca793b432e2aae293b07189172ee72e5c4559800f441352ebcc3b6ab5bcbcb101d521a1930fa3721fc9
-
Filesize
204B
MD5ca2442a926df99d5a4a91f590df2871f
SHA1c721e5ac077597c1e0424156185f17166aeeb216
SHA256b7c7a38b70ef3180252c2be1b46518349d41a54e62da3a56c2b093a1e80bd486
SHA512220e18fabcd770b46c37269be9987d7857539027247d729ba2249f8a22e961143b692bc8e9cead6473e72c1621999d2723e0d17c46743cd7fd6dd58b200984fc
-
Filesize
415B
MD5f1ad39f3289b5b3d81e86c1aed17040a
SHA15702378e1b85606876ad4aa3fe2863ac732bb060
SHA256d53acf65a92d1b9d6156e39759634502ea257c23cf0c831cb17384f4d5113168
SHA5121c4704f2ed01d1cf78a9f24f08866636daaddd2939a1f7f97fa2fdf8d8e432e12e7ee9b0c21a6838723f5448f3db4e0df6bf11064b1ee75aea3ceaca04dec17b
-
Filesize
211B
MD524847d65259bae0a4aca091bb00bddee
SHA112267e6733a13bec940fdaac4abfa455005c3ac4
SHA256c98c312744eb9e8a5dc7c080b25cc77d2baf324c9fb061e7ea804cf982043196
SHA512cf9237730aa2cca128929ae432eb477f55ba1a4e2ed180058e4e14d7fa1ea6c4d603535dc5e9b79aeaf8cc0aea519707e8756e13b3395c787248cc30f2cccf8e
-
Filesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc