Analysis
-
max time kernel
178s -
max time network
188s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
29-05-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
7fe60bddc7027b098faa6dca3067efa1_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
MidasEmptyRes1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
MidasEmptyRes1.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
MidasEmptyRes1.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
MidasEmptyRes2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral6
Sample
MidasEmptyRes2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral7
Sample
MidasEmptyRes2.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
7fe60bddc7027b098faa6dca3067efa1_JaffaCakes118.apk
-
Size
23.7MB
-
MD5
7fe60bddc7027b098faa6dca3067efa1
-
SHA1
8d8f0a59fd66b4475f8552062f7316ea6836273a
-
SHA256
b2ca8ceeeddc6a0535459e05c551c8ad2f6b58cc0e0d92314c6393048effe71c
-
SHA512
7aaa0349d4ad23d70f41302605afa659b749a9641fdc9959887b4d658103a007821b3b8252732bc6fa92fcaa3038b6efd77a6f6a30430f01e2116800907cc61e
-
SSDEEP
393216:TyCof5nfOhrMynJNGneXjbSc+MLVB63WA/xtoUlM4K0OqP14wngjZKenNZ8ja4Vj:eNf5nfOhjpSULVluxtoUFK0l8KenNZYJ
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /sbin/su /system/bin/sh -c type su /system/app/Superuser.apk com.tencent.weread /system/app/Superuser.apk com.tencent.weread:gap -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.tencent.weread -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.tencent.weread -
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.weread Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.weread:gap -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tencent.weread Framework service call android.app.IActivityManager.registerReceiver com.tencent.weread:gap -
Checks if the internet connection is available 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.weread Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.weread:gap -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.weread -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 2 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.weread:gap Framework API call javax.crypto.Cipher.doFinal com.tencent.weread
Processes
-
com.tencent.weread1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4325
-
com.tencent.weread:gap1⤵
- Checks if the Android device is rooted.
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4444 -
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4507
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d8b3cd4b44ad81480e46c9986668d9f4
SHA11097295f19f345252a0d4324fb51dbac7ffdb30e
SHA25635e5eb5b40236bddd7568a046645ecf4a4ccf0fbd6b76cf85ef06bf4e861fd22
SHA5124544ab8cc5c9059836409ad5d237973d2e96deb513b938a7764922b321f9037df5410ed306ca0bf36f01f3441c4347000494c941ef86b2a4d093b1b5a4a62537
-
Filesize
1KB
MD5cb03459c2fd27cd4f9f5e9878bd39829
SHA1aec69dc908c965a079c8eef3a1a6084b504f3c15
SHA2560f111af479d8391a98f642c84feec4f283ba3c38c2fa1b34a368719b8604edc5
SHA5125234ae27d7c64d76b24a02d44015bc69d3dcc260904d0999a428ef26cac49d4ec49f6114d74ee64ffe2a46bf86f00c2e4dc93d9d32dcfcb1f3a85c2104ee1d23
-
Filesize
1KB
MD5eb01f5acb34253ee6ac721c4a7075e1b
SHA1a1c114b955e5a0468bfb789149b738921357aff2
SHA256253979a4bb2d97901c51b9d400b62aeb7512ec8e8c2004fbef690bcef18c3307
SHA51257e4c39975187800575b0ca71960f06a3b9cff1f1f0e2ccb5c1b2a1a065e5cfe8b4298aa82cf7dd0ae99b116a037523a1482ccb2be2f4a030e0aa9a2a43622a6
-
Filesize
4KB
MD5012c0cdd841c6599f1ad389580751325
SHA1d9abb12875b3c2410fb0e57c669027163071bb8e
SHA2562fc7c016878b6c910484e1cd0978f671f5e799d4b42dce354bdc258adced9a81
SHA5125e139c56bfe53630ddd004c4709c0916fcedeee8844a4314ba8148d5e9ee68d6dce945c2cd692ebe873e94efc54142287c911b4bb0d7a117586a57aeee938d43
-
Filesize
512B
MD5a5e69d7b2b4ebc203a0ef99f4d2b40d2
SHA16ab92090b64228350c0a01ad490f1e459df6f68b
SHA256aa760ae2d1d70f3748dfc35d2b2b249e33bb2263812d775a656b416682a7d96d
SHA5129553587d796b0022ebff2e53bfc287b93c17d804f316c51c80fc7f91d2dd2c74d5bcb84b5dc574413c4e3b169479f55e46158cec3340b131139ba8fa12c7830f
-
Filesize
32KB
MD5d84fa27de7a8c972ab143d283afc382f
SHA177a800b1b5a63138ab5ede33433eba0d50e838ef
SHA256ba849e3a15d0455866b9b929e0eb5d9957e0c6e3ea5db32f2eb84f20a0b611ca
SHA51252becd3144d00f4951631d5340632b53e148e9f5a8f0bc75843c0160a602df6bfe43626412844c60df8eb98f8a5a8cf8f85247f31bac56516fb1ae9a01febe43
-
Filesize
108KB
MD58f50f4aa01d06e5f89d969921a45b3c4
SHA13e24c5e348a5e33ed04ff3b139c432b73581d04b
SHA2563c38a6a933adca24274097488db762c08c113281547cef7eb19b067373090132
SHA512708f3906db473e009801971dd6c01e945bb9d1fa4e32e2c3fa77c1ce1eace1870c86fc9b9b4c6f104d96dcefabe9083c6728be2d149bbd282566def817eefca2
-
Filesize
512B
MD56219d53bb7ef72d7f9331225c45652d0
SHA148a9b53d6a7ae5e083ba9dfbe6b60a753f133659
SHA2565e39fd618a910e7b1db60969effba04f3fa1735c93d4612f05c35d32dd9b794b
SHA512a38383de7d8dcda9834589153b11e889bbddfa98d1ad3b10bc385e7bbda3ad210c573c37b80adbd8e6a3eec1ebf0776a5be899224eeddfeeb41ac28540aa9687
-
Filesize
108KB
MD5426f5bf49fa3d11984b561a783c8ae08
SHA1b7dd8e1a1f1f3c8fd9ae319adb0692bdd9112bd2
SHA256de9ba2c916327c0114c6dd85ebf874c9f928b029c4a9d6abce627d80ce619dab
SHA5121d8f8999e81ac0cc3a54e6b35860899d2044942cec6fe549c4bb3d1b5075ad0bf6c1bc4ba68870ec2cae446d99890d7b81119e5af2df85971022061accd0d713
-
Filesize
100KB
MD5d2f8b5847cf13a877b8506e67ee6d3cb
SHA1eb6f9f49572c27ab1d58b5a233473153263a3d69
SHA2565075d3ed8a223b0e46c82a8f273a2b853bd72449bd3812c355e8ea8c9788edd7
SHA5121c47747db75baa6f0fee996d542676c7a9d40c246d7adecd54054f8bf6e670f2046c2ea1fc7b7b87421e3740a72764c7919f0e1bb5f52661ed838b2a26e68f7e
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5dd8e592a35f02d443589235c33504b85
SHA1c21eae15b4c8c390a38040d9176e9e55f0fb064d
SHA256d465f14edd7672ab8a9471d2e26bd37cdbf07c1e4a3787611b90c9db0f5a03b6
SHA512c9aa19b18f55877e3724a611f4c5665a1966b4e328a23f84dc5132c3e48abc22d4909e07941142f04a783b5676f9b9b90a1c4e37804b50a3331339e337112f5b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
221KB
MD59191265fbd99effe03c01e61e87b062d
SHA101ca3452a3a6adcf3e6f8907abeaa46e452d1471
SHA256de5f240215b808fba75abce9a85c52371db5f55339de647cc38c7083c96d0d64
SHA512636a392edce3a4910a20e046e6f9ac07c72512db26f23e177b6524e19987dc35d4fa4dfdb73735ebf531c65d49d7bd6484f84d6f4f6f55868c2b4a8da6ae5e30
-
Filesize
217KB
MD5760fe1cdd52ed57cbc8f16ab72d0c29b
SHA1d063105325aca3bc9e36961dd294130fc2aa26f5
SHA256e2a05cf0540f3c651e3bdf6dbc87b19044c3067150c947397b3101f9710bda3a
SHA512f5042aa38d701b185ace3d651bf70d6f41450fada9366661cc1916a8cb53605c82c4a7b6dce43b4e4d703bd28d8a7e41e5849b57e4b05e69678e70a11ea99e6c
-
Filesize
17KB
MD55db631a25fdf5f62a91d39814fd5ac77
SHA1701e158591d8813d6a862967d98033f322855317
SHA256c3a65b283aab7106ed404a301b8181314e0eb89af13538ac9dc184740656b521
SHA512b3d9ef13f783da4056f1bf9d7f0f0ffbc31c68d4b11fcef4695f1a43b1e90245205b35e2eb4ce8a2283598e7bf3f3fd9ce6d7461b6abbb1ebdc6f4bff315f508
-
Filesize
4KB
MD574ec053625ad2bb260711f4b95f70a9e
SHA15773a8105b3788604ca51f8ef47665bc89f21420
SHA256eb165fae5515a11eee41b5b52d85d60ab3a76557de31e4bb552908c41d93a70b
SHA512b35dbfc8d71041452d5bbec0d8a869d48173533ef4a7512658915767d44a4e90ce600b4b251eebe7f1448a09837f82e65a6e53e32d9c8ee6ede566109bb39b8d