Analysis
-
max time kernel
104s -
max time network
182s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
30-05-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
843ec9f7ed993e8126a85029cce7ef92_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
843ec9f7ed993e8126a85029cce7ef92_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
843ec9f7ed993e8126a85029cce7ef92_JaffaCakes118.apk
-
Size
2.2MB
-
MD5
843ec9f7ed993e8126a85029cce7ef92
-
SHA1
996eb1d96848497e7dbc7190cfc1397cee335152
-
SHA256
e4bef049046e8606fb48dd03b96c4bc25259eb141a487412b811c2638a77c6ca
-
SHA512
a8599fd24cb72e235eeeaf92631e84b3c49a76f221d9b5d0beb187fa8d5eaf4d370bb4def41c056701a22e04e767bebeb130cc91166e3511119b61885e816f44
-
SSDEEP
49152:j3XzUKy5A06f7LInwCFfrkTRY5lYuW7CvN+wpN/g2epeLsDq3Dd6h:jzUfAbfXDXtYUuW7CV+wD/GKto
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/app/Superuser.apk com.kgmh.whs /sbin/su /system/bin/sh -c type su -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.kgmh.whs -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.kgmh.whs/mix.dex 4270 com.kgmh.whs -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.kgmh.whs -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.kgmh.whs -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.kgmh.whs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.kgmh.whs
Processes
-
com.kgmh.whs1⤵
- Checks if the Android device is rooted.
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4270 -
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4321
-
-
sh -c getprop ro.yunos.version2⤵PID:4333
-
-
getprop ro.yunos.version2⤵PID:4333
-
-
logcat -d -v threadtime2⤵PID:4419
-
-
/system/bin/sh -c getprop ro.miui.ui.version.name2⤵PID:4461
-
-
getprop ro.miui.ui.version.name2⤵PID:4461
-
-
/system/bin/sh -c getprop ro.build.version.emui2⤵PID:4500
-
-
getprop ro.build.version.emui2⤵PID:4500
-
-
/system/bin/sh -c getprop ro.lenovo.series2⤵PID:4525
-
-
getprop ro.lenovo.series2⤵PID:4525
-
-
/system/bin/sh -c getprop ro.build.nubia.rom.name2⤵PID:4550
-
-
getprop ro.build.nubia.rom.name2⤵PID:4550
-
-
/system/bin/sh -c getprop ro.meizu.product.model2⤵PID:4575
-
-
getprop ro.meizu.product.model2⤵PID:4575
-
-
/system/bin/sh -c getprop ro.build.version.opporom2⤵PID:4602
-
-
getprop ro.build.version.opporom2⤵PID:4602
-
-
/system/bin/sh -c getprop ro.vivo.os.build.display.id2⤵PID:4628
-
-
getprop ro.vivo.os.build.display.id2⤵PID:4628
-
-
/system/bin/sh -c getprop ro.aa.romver2⤵PID:4653
-
-
getprop ro.aa.romver2⤵PID:4653
-
-
/system/bin/sh -c getprop ro.lewa.version2⤵PID:4678
-
-
getprop ro.lewa.version2⤵PID:4678
-
-
/system/bin/sh -c getprop ro.gn.gnromvernumber2⤵PID:4704
-
-
getprop ro.gn.gnromvernumber2⤵PID:4704
-
-
/system/bin/sh -c getprop ro.build.tyd.kbstyle_version2⤵PID:4728
-
-
getprop ro.build.tyd.kbstyle_version2⤵PID:4728
-
-
/system/bin/sh -c getprop ro.build.fingerprint2⤵PID:4755
-
-
getprop ro.build.fingerprint2⤵PID:4755
-
-
/system/bin/sh -c getprop ro.build.rom.id2⤵PID:4779
-
-
getprop ro.build.rom.id2⤵PID:4779
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58cf5fd61ed0dadb176aaa3b5dfa2ef56
SHA1f40bc6b955f94706051aa38fe61d3a4534f2de68
SHA256556b927d266afe20bc18c11c532098f95fb5ec5c06480c05c85ec3cf92e24008
SHA512b2b9095ed0f8d09244522b1163944457c0962690043455aea9028b63d7b5749a58fa8c30c5f455c9349697a50014d512377981bd0b210ad84ce709a1c2574dbc
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
140KB
MD5bf56dca2e18f3b837ba098819e84cb6f
SHA175a2cec1b839f5bc5eadeeeb8fe7c314298688dd
SHA25676e262be44216119355c648fb6a98b53e720006ce558d6cc50fef771e1417ccf
SHA5121dd631100d5d40c1426852714e7001c7208db97db9ed66c984363bd271176a022d42b16ed6c8bc3754112bce26913915128c3d99470861c009577f60f3c8093d
-
Filesize
292B
MD563f77f99bd2c2b772a479923bde11974
SHA1c7632e7d301e4463fafce85f84e9c3d7da3fdbbe
SHA2564c76a3af64cdd2f8713ffe2733dea50dbe714d0ca41c17d1847ee5b62a7ca615
SHA5123aae4a89d1ed51fdd911cb367eb10afe3c2264e4222085891b18a60d5412f85d10bf5c8f3c6642db70abb9aa42732bac5c42c42ee32d587100f53c21b5beb16c