Analysis
-
max time kernel
9s -
max time network
164s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
01-06-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
89c313f28b63ad9ac35cef1112139313_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
89c313f28b63ad9ac35cef1112139313_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
89c313f28b63ad9ac35cef1112139313_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
89c313f28b63ad9ac35cef1112139313_JaffaCakes118.apk
-
Size
865KB
-
MD5
89c313f28b63ad9ac35cef1112139313
-
SHA1
59327f03b70feff03a88f797b26279eb1229d8a2
-
SHA256
9b198986938166b34ea0cbe516e48e542c1e2e756269db53487fb47ec0d320a3
-
SHA512
329defec5e321e4757a29ef0edbc3d920d8ecedba2f8e854189c55ac11ac1779dbcebc7b374e1a789d6c6b32eda8ff764bcfdb279f667b7b82ffa36c2b76d6ef
-
SSDEEP
24576:KS4S17JH43TVFcYhF2b1YH4xa+nIV14Rf:t4+xqfcYhF2biH4Bmeh
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.lanyou.andrdesktop -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.lanyou.andrdesktop -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.lanyou.andrdesktop -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.lanyou.andrdesktop -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.lanyou.andrdesktop
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58b4e4c501d45742d7812ff92004486b0
SHA1bc667e58eb82c12207fa8b5d7c5212fa42ea6ebb
SHA256dd823076b53fd798dc37b88d720bdc99e2b84ed23f3f207222556779afc38cdf
SHA5121f3cb53677141da1dd33a87449a12264e2facb38bb5f3e4a4fd1295886d05446bbcd5b3ea4c254b8e2c6888c6873c1aec4a32558df9dd06ebd10d2d0247b07d8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
44KB
MD51791af4e0f40ab4d6f7e995bf589daf7
SHA187161220de65427f7c67b52e9238a501c6ec9c6c
SHA2563e87223f8c783e1e6d22bef62836fee762c4fb05c74b6384855e499425a91f12
SHA51238b0026fb43cf833441ea61030e6cb0938bf29001af31492e8aada86dd62da3a13007256ed422424a434ea7b9b88db39a1e4991bd926b989e4591dd938de248e