Analysis
-
max time kernel
145s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
02-06-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
8e2971a8a4404ac5c274368ddb6c4fb5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8e2971a8a4404ac5c274368ddb6c4fb5_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8e2971a8a4404ac5c274368ddb6c4fb5_JaffaCakes118.apk
-
Size
31.5MB
-
MD5
8e2971a8a4404ac5c274368ddb6c4fb5
-
SHA1
6b42b05d9fc6860a6473a9d4eb2b816d41a7a9ef
-
SHA256
d65b894979ab0b3f45ccf9026040e7f2aa65e06f9bd093c16068b1e934d00669
-
SHA512
ffb30a50f574095380504aa2609b7b34890078069bd3b04b666e464ab88591f67c94c8692e284699b0fc19591024c8ed87979e74ee7b408d3f8325d39b23be02
-
SSDEEP
786432:tF4A7EOVtcrtGd77dZVsssO8IqSwrW/fWccaKI5qhzMY3KhOQlorfeH:tdcrtsZ+ZS2GfWCKIAZZahOyoLW
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.mochibits.hexario.googleioc process /system/app/Superuser.apk com.mochibits.hexario.google -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.mochibits.hexario.googledescription ioc process File opened for read /proc/cpuinfo com.mochibits.hexario.google -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.mochibits.hexario.googledescription ioc process File opened for read /proc/meminfo com.mochibits.hexario.google -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mochibits.hexario.googleioc pid process /data/user/0/com.mochibits.hexario.google/cache/1582435991586.jar 4558 com.mochibits.hexario.google -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mochibits.hexario.googledescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mochibits.hexario.google -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.mochibits.hexario.googledescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mochibits.hexario.google -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.mochibits.hexario.googledescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mochibits.hexario.google
Processes
-
com.mochibits.hexario.google1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Checks if the internet connection is available
PID:4558
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
Filesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/Unity/8aad2516-ac1c-4f73-84e6-518e82dfa025/Analytics/config
Filesize346B
MD5be9c7776487d2e7acafe19ee6b8f21d6
SHA190810f66873caf39148ba339ce3beaa77e1298c1
SHA256cb1fbaacc4744f268bfd751d7d4b3d8591acea8175dd4cffce28b96a3eb2886c
SHA512b2eb531d818c211f83b35d98e479cd4ca4720e269b9a13a9e1684bd15e10dbba6ce524d8da1b4bbacd124f0a6daec0a6716b464b3cfd29be958b778f32d45d11
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/Unity/8aad2516-ac1c-4f73-84e6-518e82dfa025/Analytics/values
Filesize152B
MD5ae5213d1f0a72fb3c1cf9242958ad793
SHA136f94ba411c82ce82d365024b43a69f2b0afc6fd
SHA256766a70553460bd3e3251a3f7f999711cf0d4061f75f4464ca391fe072a00a980
SHA51259432e9580204fd2205f2b3dac2cf5ceac7e40ad6bb3f2411f20f30ba1191a9326ab891036df209b1af945a51d11d1d11ae5b64f21102d91f527204c35b6529b
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/1292df95d32258b0080111faff108243f13eefca_v23_phone.mp4 (deleted)
Filesize922KB
MD5b75be72cc7d717899e27fe402bae929e
SHA13fc603fee3aa43d9a974ae03c3e010d76e6a77b9
SHA25673ce50bca99856596aeadf4d0a1bae648d502f813226ddd246373f6e18e35f5d
SHA512a1b981c932b9b8c650fa7af5b0682ab03b9e39507c5408903756c407f75fa5e683121fc16643eba10590754311ad96fd15dec665c43186539f666bd0a4c2e292
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/1381250003_28x28.png (deleted)
Filesize539B
MD5759a106983ec92f34344dc5064efd29d
SHA12c237ecc3297a144ed9eed2c4e0ce68d5bffa07b
SHA2561b5b3be1232ba117e19d81f6d0a2d6d1d14ee6cf726fa2a2800e19166736ec81
SHA512516b0053563a00690e503780c883d51b84143498305e2cc7bbee4489e1a06d38a2c637eb3c125b7d5e1def35e31a66434f403c2a7d9634e87c8b87f05a94bb49
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/262b0697f5b375d4ecb37867878b8cb8e65874cd_v23_phone.mp4 (deleted)
Filesize1.3MB
MD5e3fbf80537d29c32dffafe733f575af5
SHA1ab14ee5652d7c36cf236c0ac78913d2f017e27b3
SHA256b9d5b1bcfb51d2175f53ca3b564f09ff226ba489a15a849f7ccb0b05a509514f
SHA51238597bc4181abb5c67aaedae1be3a86a3365fe99c31b1982985346ce84f10884fcc979f54c64479af78b9a3496671ac391f784f692c515959bdb13b0890a653c
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/7d20f62a157bd884109920655b552d0f2e7ad990_v23_phone.mp4 (deleted)
Filesize1.3MB
MD524d56e552b10498c3a873bd6eba97b0f
SHA154da191c8f2339aa6118a3bfb6341bd6a612e4db
SHA2565855da0d71cdf9202794b8d901f7f842fd40d9840b8fd97e18dbd289311f8849
SHA512432c2d5b0eee54304408fdd55e9e1585cc59307b957834430b762d15383f0bfe0f8076bb92b3fcea390107f6e8b0a947325ebaa68a464c66bccc992dbe45237c
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/o7830d9d_6ac71583bcdc2fe0a01a3a7f60b49571f0f8f37d_v21_phone.png (deleted)
Filesize78KB
MD56ac958c0ad4709f130f84332b08da232
SHA1ce41db526be138f4449bded8676670022034865e
SHA256bbc72339adf5818993fcbc760d03d36d38ca6c90b7836f65e7fb112a55b9ee3e
SHA512acf1c5abc3dc554a9e9442b78042f5a99942400224d607bb29dcfc8f53a9aeb845a589cb11b5e10eaed2b0e4b93dca9f5098aacee9a7d132314175186b8b2842
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/oca2768d_27dace86f9e19a88e664543820f418700bb9157a_v21_phone.jpg (deleted)
Filesize111KB
MD5e6fa80a397a6b358672b18e683772ac6
SHA11b2383224f3c655dd026baff32e5c643e995b246
SHA2562d62ab2f5806635fb34480dc063618a92f46e5edcade6f5ec7d972dcef9386ab
SHA512e6ad06084232bfa70d077878145c6d341e3fb07beccfac497c466bbeade36c57a4330fe589d5b4fb430078d6876b7d04e7074cb8c7a9166f532a7ab01b016532
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/ocfe6a63_5f458a958915e9ded55ce4810448452f3bfc7b65_raw11.gif (deleted)
Filesize199KB
MD5cbc5415ee284d959b09bb951b80ff986
SHA15f458a958915e9ded55ce4810448452f3bfc7b65
SHA25682b36a96e1e8315c7043ffff1249d87f3b93cd132a07c465d5570347a4237072
SHA5127d2bb90aeb96537ee749a236ca898cadbc52f17bd4a8827eb3e9ff734b775153206743114033e920ea260013895c5a9d436159c48c795ec49a4e5b871bbb1d57
-
/storage/emulated/0/Android/data/com.mochibits.hexario.google/files/al/od0788cd_32ee7c1585c0b28eb40c4828fd01159d95a470c0_v21_phone.jpg (deleted)
Filesize185KB
MD5dba082e4be4c36c49893fd4c8152497f
SHA195a8cb8cc2577434d753dceaa591a534ea017732
SHA256fdab37386bf56ee418ff78e46f9e6d890928691d4c9e4e5dfa96b3726a0e161a
SHA512ecc1ea903dd68eead500c06b86dd149a96cb2b2c6241c29fa7be35eadc8c8c1b716e1ff6a1229b40b94659249c8deb3ca921c8087bf03c5c20373a1a2aef8897
-
Filesize
6KB
MD5d9a4fb40256f67255242c0f41a0d3de3
SHA11c99e725cebba2c3f5808d5e00c73af58f0790bb
SHA256a7e16ed6d339c6a85870e5c18952f839d61dbd93d47dbbb49e7f7f9124cd0d2b
SHA512a09d5d878cbf2f58ce256814b9d19d9122858609035b2c15e19e2da8171e36d0ffff4b33420d4d27233200b430307f1fa42459889b52f66e4282af8a84edb8fa
-
Filesize
5KB
MD574485ec832d65f19b05f5027220df53b
SHA149116a6b85bec84512241c9dc6e511ce10bdb7b9
SHA2567a89be15d3a268c6820f385ac6d4585bf04b45e2fdff37948b2a73afa34c1268
SHA5129acf56fe90a687ae653ab5014aacaeb7ad6f76982271df5f63e536a358f3f53b63f7e865fd8180bee96980cbfd4ba9b07b81977f86c9b9d0b41ca1dac0556657
-
Filesize
24KB
MD554c9c5d40126e729d3eb1db81420c3d2
SHA1cbee54076e1f1dce5f418d62e13cd12500a6ff2f
SHA2569cfb903afa8a5c82d8f8f96369229337a2be8c1c980dd908168b7555f69a2e31
SHA512ed72c4274d3d029e7334907f40d368feb3060c062823a182cdb84158b6936c8d7bf6bf8fedcec889c67a3641a658a79da6be5e11d7bea653bbdd6f5ca51cfa68