Analysis
-
max time kernel
156s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
01-06-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
8949113d36ef384f47cc70a1dffd18ab_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8949113d36ef384f47cc70a1dffd18ab_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8949113d36ef384f47cc70a1dffd18ab_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8949113d36ef384f47cc70a1dffd18ab_JaffaCakes118.apk
-
Size
4.8MB
-
MD5
8949113d36ef384f47cc70a1dffd18ab
-
SHA1
c9e3c4a147f63bef5035764ec4b59336646b13a0
-
SHA256
35c3b2b50dc85b260fb98e5cb1ac33ec10a29946de0d2bf40f054e0d0dcfdea2
-
SHA512
49f253e692bcb644f915c35f653aa459caab27e13f0d3c6a580639b8935b370cfa8a6fe4ae9250189632b529fa85205d37cf9276a3b048c8f730fcb360343b31
-
SSDEEP
98304:ElBxnXLS/e95HdmnKotNYaXxhZ0W8NrKFD7her3D3fJvd:EdLGCdmK4YaYrqx6391
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/app/Superuser.apk com.coolsnow.gif2video -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.coolsnow.gif2video -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.coolsnow.gif2video -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.coolsnow.gif2video -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.coolsnow.gif2video/.jiagu/classes.dex 5115 com.coolsnow.gif2video -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.coolsnow.gif2video -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.coolsnow.gif2video -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.coolsnow.gif2video -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.coolsnow.gif2video -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.coolsnow.gif2video
Processes
-
com.coolsnow.gif2video1⤵
- Checks if the Android device is rooted.
- Requests cell location
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Reads the content of photos stored on the user's device.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:5115
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5dc59811ad8212f0b7e1d78e273dda0ff
SHA13ee6f5766f69bd9c78c2442b654ea493894fcd20
SHA2564eee9700ea2e4c99dcd4ccc9fd3c477f1ae344eebdf2015f84e2c1374eb15771
SHA51235c22b76dbc86273548f72434beeec4ab907f11588ddf8cf405e2a488063f764f341ccb584bde968d110082d05c24d5d768c64338bffcebbc5db7e2ddf4293e4
-
Filesize
558KB
MD598736de515958ae37ae93a0a0e997098
SHA172d0f9d43f7c9bdc9f19d13834c0872f5652c0f9
SHA256335091dfc73a9f792cb720389c5d94eb6642764a38d70d4b6b7a8afd34038421
SHA512cc4974ce398bf7f4a20160ad30e4c4b5821ff0d7f2cc9fa0aead73ddc036585266edf429add276b53d6db8dd24a344d709469b9c839451deead6b621e70c92cf
-
Filesize
569KB
MD564f0958be2a8e6862b90faacb40129e0
SHA1389c618137db70dbf84adffcdc3c5d4850a5ff24
SHA2564f38bee50f32a8c64f4f9c671b7cece34d4a1cb926087fec8ef505327d4edfaa
SHA512793cb7104013b7841c38e4aa14f4d9246aefa61aa9803160e6398c4115a2df5c6af304bad045c687467547deaab3bb77272a675b0d673f81f2df3dee2d1fe94d
-
Filesize
1B
MD501abfc750a0c942167651c40d088531d
SHA1d08f88df745fa7950b104e4a707a31cfce7b5841
SHA256334359b90efed75da5f0ada1d5e6b256f4a6bd0aee7eb39c0f90182a021ffc8b
SHA512d369286ac86b60fa920f6464d26becacd9f4c8bd885b783407cdcaa74fafd45a8b56b364b63f6256c3ceef26278a1c7799d4243a8149b5ede5ce1d890b5c7236
-
Filesize
32B
MD545ed1541d7f44071e210968f2b7dddfb
SHA1075e15e7937a7778057219f67c262bd7e2aff310
SHA2565b357b0ae5f1193bc054c43a2a7f3ba4197d3a40e9a0f95f2af1668fadda8e09
SHA51224b4b28e13b9edacaa0373f78b313f04498e501789b01186155244823708c188a481840c34045447244e70184cb9af013cf23a90860bf74de722b38bfafa58fe
-
Filesize
32B
MD562c56cb6ea0a495b2ff2e999a4591d8b
SHA1c3c359a73d3e558d4cfe94317681bb76b638d5f3
SHA256ae74a2af8fc9b3b620393d6891ba8679d368a9205706e655a063fa5a31b64020
SHA5126a022ffe606ffc03d7819cad3666dc9440a36c4e916f3aa1a76f41d52bf6147b8b51461050c6d0fe40f0b180a324bea88259a7649038a4784c4221707240bdeb
-
Filesize
32B
MD574c5be926c91af4b5ff7be685b48adf5
SHA12a299d3dc6a086d25ebf6a1d8a28b739dfaf3180
SHA25691bddc926355aa817daef947f53684da7db10d44b1a4b7f5e877670f8ea97880
SHA512d21aa59438716382eee33becc58c23b66637d37b152b50b1dac5a5fdeef960f41314ff6be58c884dd0772f896695463ddd8e344ceb2dbb5023cb1a4b6ad6a950
-
Filesize
307B
MD568abdf12075d9082dd57352e11a7188a
SHA1fa2b7bc45fa299b2c8b21c1935dcb74d2e5cbe7d
SHA256f4a9c44a497a40a790d711d75d1085b1ad46c8a77cd49449d4d0def96abc4086
SHA51278dd6364c299af485f906bed90b924479678cb44cbf0e187a076f0b90745cb957c5620178382463f4707359fff94391d9fd122d8cd460853757b4182c0759d4f
-
Filesize
314B
MD56de3c30d1664c54c190f8f5ca72954fe
SHA1392fe7413fa927c3010d6df3a405b7a910187cf0
SHA25641a8050d6521d6dbd710740e7d6baf49ff6f1464f6269fde354ded7f90326a27
SHA51228d6d46fb4488e079b81c782dedfc25bc7ffd0e4653d912dcd16b5ee53f48a5c205a1d59478c5985879c3cde54e25e981caaad952e2b9cb12c9ab429ce82af55
-
Filesize
32B
MD5da5451d88bdbd4c7b30e95ced4a90be6
SHA1bef393923343a5a5fc24af96f6be708ebce937ab
SHA256e9a559dc2f5998826ddea5bf7cb3711b4815a874fbb6d9d6e8e403cc19076626
SHA512a5231bda44b94cd6af44bc6cd663f9b05b0f30e63d51e18d2e0a45d088e4e8e8d980d5e03a94789490714636bc4845387c86cf402d80fa1c4aeff5ed8f394fa3
-
Filesize
27B
MD57ed4580a24ea6d1a09484a60f140037e
SHA1883585a2b898d5d7d008d629fefc2fc13aa6c291
SHA2568858131364821973724bbbbb10169764ab59fa1d180bfa1579909842163c58ce
SHA512517678bed059d1303ca937b187d6deedf9fa7218ce040b8d0e476a4b7a2d4e317ea2696fc169a35807da12730d9cdf89ab07c46a9a15f8fe222f1e31e84c739b