Analysis

  • max time kernel
    179s
  • max time network
    176s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    30-05-2024 11:18

General

  • Target

    840af04291bf6f8c239c5178e1674772_JaffaCakes118.apk

  • Size

    263KB

  • MD5

    840af04291bf6f8c239c5178e1674772

  • SHA1

    35322bd708e281a3af6f33a7a48cf01f969f123c

  • SHA256

    0516416947f71b9af9dbc95a72b0d4fd0fbff816c97bca163deed795cd75d02d

  • SHA512

    30a41c2a1ff09f2e7a0a479d7cd2b160d498398bc43ab0f338dae1a822e5611e3932ad21c60c836d8956003ad68497a5d9b47834107398305ef46ddf641696f2

  • SSDEEP

    6144:bRIZPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNq:bRI3i6tQIwsBFa/IvcR9Uq

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Checks if the internet connection is available 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 2 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.news.geynci.jxvlsxqrljv
    1⤵
    • Removes its main activity from the application launcher
    • Checks memory information
    • Loads dropped Dex/Jar
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Checks if the internet connection is available
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4626
  • com.news.geynci.jxvlsxqrljv:RemoteProcess
    1⤵
      PID:4668
    • com.news.geynci.jxvlsxqrljv:guard
      1⤵
      • Schedules tasks to execute at a specified time
      PID:4963

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/user/0/com.news.geynci.jxvlsxqrljv/app_tfile/fields.jar
      Filesize

      138KB

      MD5

      cceb8db3b057d24673d49eda229e9892

      SHA1

      b18f6353b2156410249079a3b7b86ef3a530e8ee

      SHA256

      e900cb4c3fe9d8f45196a7457e9645c65b0f3cde820f4161950252cff67a4d97

      SHA512

      4a42cde3165a706e823caa1362001ed8aa647caf22325a4f2554c64fc4ebcd79afe44fe5eab5474221806f26e7aca9d2901026de6e597ef62fe867f123e4bd57

    • /data/user/0/com.news.geynci.jxvlsxqrljv/app_tfile/fields.jar
      Filesize

      281KB

      MD5

      73b11c4c10150bbd4f29ad012dc11dde

      SHA1

      65c83ad32c29f9811c32eda75d7fcdc92ef42dda

      SHA256

      52132037e9b950a9cb48d6374ee2c6747a6bfe776e13a726395771f1b40ee9da

      SHA512

      3e53b1ee22a00e60896da86d2695195e0965c93d190c4d1c0dba2eb5c611d670ee7693a9f8756858255e2b170cb82a753719dd4d6a827af437309b7a1dcc6f01

    • /data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv
      Filesize

      36KB

      MD5

      ebfd4869bb86abd638bc48b891f3e1c8

      SHA1

      a27f262fe7a41ec9976d457416447f8b78c80e03

      SHA256

      5f49bca53de766023101cc1ac8dda79a83c485fce8d9138452b39d1853d2fe0f

      SHA512

      062fd15e0a34619071834f2d81889e6a100c3a707e53621b16d584182a57c690f6a24a73e19fb77678d857fde477935811a963998a73d7ffe971d6ebd9cafb07

    • /data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journal
      Filesize

      512B

      MD5

      8e85ae3976c64a5bcff0d0f959b9def2

      SHA1

      fdf9684d7d565453e3bc0c552281181abff413ba

      SHA256

      d596d8645935bf07021179f928ae1ba4e6e61e3aa484ab031dbabda95aa02acf

      SHA512

      f06ca191a9fcc3d005aeb9a8d6936e79b9a716d4639ba697413c361f0272642b2d23066a424e3ac1c9bc2ba609062a4bdc594b77089cdb5cf24fe9e2fe7970ec

    • /data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journal
      Filesize

      8KB

      MD5

      63d53b9b1afae6802c6e754f57666936

      SHA1

      dad40ec794a74c2c2d935b1546f23e5dc2fd8fe7

      SHA256

      c77cb1d71fdf912bfee94252d67e9bc7ec1d27dc86dfd6a06899d58ce65d1d2b

      SHA512

      bcad80673adaec95af50ca5668cd2bd73b0140413ec2f935a39b99748197a51e2397c42c09eede97de327b03d096215a4ec0a71ead938d8e3f76dabfd5bedba9

    • /data/user/0/com.news.geynci.jxvlsxqrljv/databases/tbcom.news.geynci.jxvlsxqrljv-journal
      Filesize

      8KB

      MD5

      d597bacc4151736b0487c16dbba37ccd

      SHA1

      22f4aede8d7d6909ad1ac6c3236bcca56858324a

      SHA256

      12c4132db1368c136317f570054bb73a44c4d4097154308fb95c13791089e911

      SHA512

      75be8fba62da6952f93455088292a2d7e6fb2f32f3a673e5805e51ada0e6310268c07767d68aa15de8eaf88e2254f23c82479da377627b0961b32bdb426e8a75

    • /storage/emulated/0/Download/sdsid
      Filesize

      4B

      MD5

      b8c37e33defde51cf91e1e03e51657da

      SHA1

      dd01903921ea24941c26a48f2cec24e0bb0e8cc7

      SHA256

      fe675fe7aaee830b6fed09b64e034f84dcbdaeb429d9cccd4ebb90e15af8dd71

      SHA512

      e3d0e2ef3cab0dab2c12f297e3bc618f6b976aced29b3a301828c6f9f1e1aabbe6dab06e1f899c9c2ae2ca86caa330115218817f4ce36d333733cb2b4c7afde7