Analysis
-
max time kernel
179s -
max time network
176s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
30-05-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
840af04291bf6f8c239c5178e1674772_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
840af04291bf6f8c239c5178e1674772_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
840af04291bf6f8c239c5178e1674772_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
840af04291bf6f8c239c5178e1674772_JaffaCakes118.apk
-
Size
263KB
-
MD5
840af04291bf6f8c239c5178e1674772
-
SHA1
35322bd708e281a3af6f33a7a48cf01f969f123c
-
SHA256
0516416947f71b9af9dbc95a72b0d4fd0fbff816c97bca163deed795cd75d02d
-
SHA512
30a41c2a1ff09f2e7a0a479d7cd2b160d498398bc43ab0f338dae1a822e5611e3932ad21c60c836d8956003ad68497a5d9b47834107398305ef46ddf641696f2
-
SSDEEP
6144:bRIZPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNq:bRI3i6tQIwsBFa/IvcR9Uq
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.news.geynci.jxvlsxqrljvioc pid process /data/user/0/com.news.geynci.jxvlsxqrljv/app_tfile/fields.jar 4626 com.news.geynci.jxvlsxqrljv -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.news.geynci.jxvlsxqrljvdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.news.geynci.jxvlsxqrljv -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.news.geynci.jxvlsxqrljvdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.news.geynci.jxvlsxqrljv -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 2 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.news.geynci.jxvlsxqrljvcom.news.geynci.jxvlsxqrljv:guarddescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.news.geynci.jxvlsxqrljv Framework service call android.app.job.IJobScheduler.schedule com.news.geynci.jxvlsxqrljv:guard -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.news.geynci.jxvlsxqrljvdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.news.geynci.jxvlsxqrljv
Processes
-
com.news.geynci.jxvlsxqrljv1⤵
- Removes its main activity from the application launcher
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Checks if the internet connection is available
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
-
com.news.geynci.jxvlsxqrljv:RemoteProcess1⤵
-
com.news.geynci.jxvlsxqrljv:guard1⤵
- Schedules tasks to execute at a specified time
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.news.geynci.jxvlsxqrljv/app_tfile/fields.jarFilesize
138KB
MD5cceb8db3b057d24673d49eda229e9892
SHA1b18f6353b2156410249079a3b7b86ef3a530e8ee
SHA256e900cb4c3fe9d8f45196a7457e9645c65b0f3cde820f4161950252cff67a4d97
SHA5124a42cde3165a706e823caa1362001ed8aa647caf22325a4f2554c64fc4ebcd79afe44fe5eab5474221806f26e7aca9d2901026de6e597ef62fe867f123e4bd57
-
/data/user/0/com.news.geynci.jxvlsxqrljv/app_tfile/fields.jarFilesize
281KB
MD573b11c4c10150bbd4f29ad012dc11dde
SHA165c83ad32c29f9811c32eda75d7fcdc92ef42dda
SHA25652132037e9b950a9cb48d6374ee2c6747a6bfe776e13a726395771f1b40ee9da
SHA5123e53b1ee22a00e60896da86d2695195e0965c93d190c4d1c0dba2eb5c611d670ee7693a9f8756858255e2b170cb82a753719dd4d6a827af437309b7a1dcc6f01
-
/data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljvFilesize
36KB
MD5ebfd4869bb86abd638bc48b891f3e1c8
SHA1a27f262fe7a41ec9976d457416447f8b78c80e03
SHA2565f49bca53de766023101cc1ac8dda79a83c485fce8d9138452b39d1853d2fe0f
SHA512062fd15e0a34619071834f2d81889e6a100c3a707e53621b16d584182a57c690f6a24a73e19fb77678d857fde477935811a963998a73d7ffe971d6ebd9cafb07
-
/data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journalFilesize
512B
MD58e85ae3976c64a5bcff0d0f959b9def2
SHA1fdf9684d7d565453e3bc0c552281181abff413ba
SHA256d596d8645935bf07021179f928ae1ba4e6e61e3aa484ab031dbabda95aa02acf
SHA512f06ca191a9fcc3d005aeb9a8d6936e79b9a716d4639ba697413c361f0272642b2d23066a424e3ac1c9bc2ba609062a4bdc594b77089cdb5cf24fe9e2fe7970ec
-
/data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journalFilesize
8KB
MD563d53b9b1afae6802c6e754f57666936
SHA1dad40ec794a74c2c2d935b1546f23e5dc2fd8fe7
SHA256c77cb1d71fdf912bfee94252d67e9bc7ec1d27dc86dfd6a06899d58ce65d1d2b
SHA512bcad80673adaec95af50ca5668cd2bd73b0140413ec2f935a39b99748197a51e2397c42c09eede97de327b03d096215a4ec0a71ead938d8e3f76dabfd5bedba9
-
/data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journalFilesize
8KB
MD5d597bacc4151736b0487c16dbba37ccd
SHA122f4aede8d7d6909ad1ac6c3236bcca56858324a
SHA25612c4132db1368c136317f570054bb73a44c4d4097154308fb95c13791089e911
SHA51275be8fba62da6952f93455088292a2d7e6fb2f32f3a673e5805e51ada0e6310268c07767d68aa15de8eaf88e2254f23c82479da377627b0961b32bdb426e8a75
-
/storage/emulated/0/Download/sdsidFilesize
4B
MD5b8c37e33defde51cf91e1e03e51657da
SHA1dd01903921ea24941c26a48f2cec24e0bb0e8cc7
SHA256fe675fe7aaee830b6fed09b64e034f84dcbdaeb429d9cccd4ebb90e15af8dd71
SHA512e3d0e2ef3cab0dab2c12f297e3bc618f6b976aced29b3a301828c6f9f1e1aabbe6dab06e1f899c9c2ae2ca86caa330115218817f4ce36d333733cb2b4c7afde7