Analysis
-
max time kernel
179s -
max time network
178s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
31-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
-
Size
687KB
-
MD5
85a241e9b28d7c602503a9276f413662
-
SHA1
efc2064ac32d963e326ff0641ddacb58fab72f1a
-
SHA256
96f6f725178d648dd98d16d7e9095457b42bfe7b15419c0e470dc312b697890d
-
SHA512
55c3ecc637cb2f5ad29d2d07b06262b63e7341dbd150d1232a903501ea319ddb59492e5ab45b283c80deef98eefbe51e616ffc19e5cfe35c41baeff1474acd5e
-
SSDEEP
12288:t3AxEHw9xbIW0T+NZQMjQzdQ2bqX3i7Q5CvvkclrtssdU:t3uE35T+QMjQzdAXElrtHdU
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.dyxnjbcw.ckrchucretioc pid process /data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar 5070 com.dyxnjbcw.ckrchucret -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dyxnjbcw.ckrchucret -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process URI accessed for read content://com.android.contacts/contacts com.dyxnjbcw.ckrchucret -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process URI accessed for read content://sms/inbox com.dyxnjbcw.ckrchucret -
Acquires the wake lock 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.dyxnjbcw.ckrchucret -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jarFilesize
78KB
MD5718583315524e4a1e3382647d755dcff
SHA1f0f23d239e019cf3fc7dbe0c088732c114ae2fc1
SHA256a2249042923e68c71766babe513cdf56b5ea1d9dc98ecc53d94edd094d531462
SHA5125d4cc55cdffa59b2818314d8f6cf49257b9996ef41026236f3e2957656528ce61d3fac4ab4769d7ba50c65642d5d32a444cdb0cca32d60d0dfebfb9f3d1c5f26
-
/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jarFilesize
179KB
MD58811b67f19cc17b23b91aefec75ea611
SHA1107ba3f56c102557a6c58b3eabec318ed3c7fe28
SHA256f3876a99c5b66df9a3dbd4cf1be2ec1ddde6532a232d2ef67a35777c00e0c33a
SHA5128e45b1235cd60fc35586fde71870e635e12e4493ee70b058e551df2309d31ff72b39a91d6b5ccea8b6732ab34f81bb459d011efac44cfc0ee4ddb46abb4680ad