Overview
overview
7Static
static
68d91d7043e...18.apk
android-9-x86
78d91d7043e...18.apk
android-10-x64
7ForumPlugin.apk
android-9-x86
1ForumPlugin.apk
android-10-x64
1ForumPlugin.apk
android-11-x64
1RaidersPlugin.apk
android-9-x86
1RaidersPlugin.apk
android-10-x64
1RaidersPlugin.apk
android-11-x64
1SpeedUpPlugin.apk
android-9-x86
1SpeedUpPlugin.apk
android-10-x64
1SpeedUpPlugin.apk
android-11-x64
1TencentUnipay.apk
android-9-x86
7TencentUnipay.apk
android-10-x64
7gdtadv2.apk
android-9-x86
gdtadv2.apk
android-10-x64
gdtadv2.apk
android-11-x64
Analysis
-
max time kernel
7s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
02-06-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
8d91d7043ed90a2a865051e4b0c55e75_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8d91d7043ed90a2a865051e4b0c55e75_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
ForumPlugin.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
ForumPlugin.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
ForumPlugin.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral6
Sample
RaidersPlugin.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral7
Sample
RaidersPlugin.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral8
Sample
RaidersPlugin.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral9
Sample
SpeedUpPlugin.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral10
Sample
SpeedUpPlugin.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral11
Sample
SpeedUpPlugin.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral12
Sample
TencentUnipay.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral13
Sample
TencentUnipay.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral14
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral15
Sample
gdtadv2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral16
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8d91d7043ed90a2a865051e4b0c55e75_JaffaCakes118.apk
-
Size
28.1MB
-
MD5
8d91d7043ed90a2a865051e4b0c55e75
-
SHA1
7b6975884c1563c7210ae38432a6a1d5e7c7c57d
-
SHA256
dceb9da6a75947d4ca9d3fd8d636fd979522b85bfe4d4b40f52a3e4c822cc03b
-
SHA512
024c098d191e590b4f1e4ea4173b9559e5e626bd6ccb957e831d74d5c215999aecd8f8c98c889beac86c5986ddfe5fdcec796380fe41d0d786616e03eba4f46c
-
SSDEEP
393216:ocjb6qJMe4lFQqPLfa03EUmy/IRgvTARsU0BnRs1m92dx7uaDfDTy/GJiqm67:NbPJSDPLfa0UUnQRgvU8YmwuaDf6NM
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.tencent.tmgp.hsxxldescription ioc process File opened for read /proc/cpuinfo com.tencent.tmgp.hsxxl -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.tencent.tmgp.hsxxldescription ioc process File opened for read /proc/meminfo com.tencent.tmgp.hsxxl -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.tmgp.hsxxlioc pid process /data/user/0/com.tencent.tmgp.hsxxl/app_e_qq_com_plugin/gdt_plugin.jar 5116 com.tencent.tmgp.hsxxl -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.tmgp.hsxxl -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.tmgp.hsxxl -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tencent.tmgp.hsxxl -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.tencent.tmgp.hsxxl -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.tmgp.hsxxl -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.tencent.tmgp.hsxxldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.tmgp.hsxxl
Processes
-
com.tencent.tmgp.hsxxl1⤵
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:5116
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5b21bcf99bc6cfa9edadc401ebd168e21
SHA10f53b96fabd9e73c493a24b897276556ab2c49ba
SHA256d1fac34723dd4d7188dd4a89aa369eb70e3dbec9774118a18aa0907ddba46517
SHA5128d4e8239eb07aaad86bcb948e10eb278ae24e0c61a4b01ee152a380fc57187d473a0cc21d1e2d5cd896f893ed5eec3df1e3150b05ed495a31ec7c16061060a48
-
Filesize
180B
MD5a4b647c0c835b99edd8d681c20f0add4
SHA1596f8f16b8852d073e293fa6ac3f388a5cfe976c
SHA256245e9fc609f81f48a5c230e6ac73b23663d37009d9b254c4ed90e78c0035bf0f
SHA51213ce2cc10b162b87ababe633ff011532056bdbb2464b38ce19be0a8962e7b8b8fdbddfaee19fd9381dffe996c16ff44f4c8b14383c49b2954d5c574ec7d39eb3
-
Filesize
4B
MD5dce7c4174ce9323904a934a486c41288
SHA1e117797422d35ce52f036963c7e9603e9955b5c7
SHA2560c030586945fe504b604ecc2e875c38ede400cd5cd73da9730302162e6b02c6f
SHA512d570ab6a8f4a7b54d426b0481219074b5277ace37d88438d87ab97eb387938eca1cf7b09fa42d596c56ada860710d2a7385d2a96e1cedff58ad6ed8900f1b143
-
Filesize
1B
MD50bcef9c45bd8a48eda1b26eb0c61c869
SHA14345cb1fa27885a8fbfe7c0c830a592cc76a552b
SHA256bbf3f11cb5b43e700273a78d12de55e4a7eab741ed2abf13787a4d2dc832b8ec
SHA51291972aa34055bca20ddb643b9f817a547e5d4ad49b7ff16a7f828a8d72c4cb4a5679cff4da00f9fb6b2833de7eb3480b3b4a7c7c7b85a39028de55acaf2d8812
-
Filesize
185KB
MD53f2e7af379565ac1772b4737fc3916b8
SHA178c6f3723b35b8f7ddea69456d610cc6146ee7f0
SHA25645a06a336efb41d7e51e5f2ff1c4e4c6e0bbc90beb022e572825321c1060dd4d
SHA5128a166b8390eab2490451c4aff1bdcdc9b06e8a98a41b884a18e800d21caa35f1a16c622034e3684230073faa638ee9e4c9bef7756d027366676134c34ef68d5b