Analysis
-
max time kernel
154s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
02-06-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
8eef018905d9bc6229ba7d8f3d92a0bf_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8eef018905d9bc6229ba7d8f3d92a0bf_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8eef018905d9bc6229ba7d8f3d92a0bf_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8eef018905d9bc6229ba7d8f3d92a0bf_JaffaCakes118.apk
-
Size
21.9MB
-
MD5
8eef018905d9bc6229ba7d8f3d92a0bf
-
SHA1
826649b5c67422bbde3d13709d57c6037f93b312
-
SHA256
1b311a7dfd7fe71e8dacca65b86ac4f1dd4219303f37a85f85392257fceb1951
-
SHA512
6a8cf4547f29f298d347634f102306fcf1aa8a4d2b5866d2812ee2cd0bbeb87d71064f8ae54696e97e9d0f5e05becfe98eca353df2e4edf6aa924633e95e6d79
-
SSDEEP
393216:2CP7MoJoLkSYOox6V2pPxrjhQ+JgjntXFjy8rwIqEIrvLmIpAPd7yiIs2rgERar:UoJo5wzs+JgjntVzwM4vLmIGQiBEM
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
china.zh.n.FireHerodescription ioc process File opened for read /proc/cpuinfo china.zh.n.FireHero -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
china.zh.n.FireHerodescription ioc process File opened for read /proc/meminfo china.zh.n.FireHero -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/china.zh.n.FireHero/files/__pasys_remote_banner.jar --output-vdex-fd=74 --oat-fd=79 --oat-location=/data/user/0/china.zh.n.FireHero/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&china.zh.n.FireHeroioc pid process /data/user/0/china.zh.n.FireHero/files/__pasys_remote_banner.jar 4360 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/china.zh.n.FireHero/files/__pasys_remote_banner.jar --output-vdex-fd=74 --oat-fd=79 --oat-location=/data/user/0/china.zh.n.FireHero/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/china.zh.n.FireHero/files/__pasys_remote_banner.jar 4308 china.zh.n.FireHero -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
china.zh.n.FireHerodescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo china.zh.n.FireHero -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
china.zh.n.FireHerodescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone china.zh.n.FireHero -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
china.zh.n.FireHerodescription ioc process Framework service call android.app.IActivityManager.registerReceiver china.zh.n.FireHero -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
china.zh.n.FireHerodescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo china.zh.n.FireHero -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
Processes:
flow ioc 7 alog.umeng.com -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
china.zh.n.FireHerodescription ioc process Framework API call javax.crypto.Cipher.doFinal china.zh.n.FireHero
Processes
-
china.zh.n.FireHero1⤵
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4308 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/china.zh.n.FireHero/files/__pasys_remote_banner.jar --output-vdex-fd=74 --oat-fd=79 --oat-location=/data/user/0/china.zh.n.FireHero/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4360
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5289aa52188b4a1eb9a3a5904b0638ada
SHA13efe010f8832bc5ee7df88152e01ef1f446663c4
SHA256947be2e29c43127ccaa6ab05b2600405cebd5aef985204a4cf2e17ecf7cfaa91
SHA51234078ccf3fc42c63f338bb9f62eb139d953ad9e0e5fd813465d9f4d37f708fc20d7309897919cdf6be37acbda2669fd6d32ff4a233279e2cd6e2a0ba62cdc47d
-
Filesize
197B
MD51661235479cff8617f6f51614da42182
SHA15c4e7dc3fb50e6b16672a4d8c3100788649bfc0f
SHA256a782e3520ede4a1fb7014a2853e8d43bdb9a8964aa63db236e79eee984934c57
SHA51236d036a9201cab82b1da0927df06d99d982eb22a973a1ee829f30fcd9784f49b14e52ecb89a6d72598a6988b510d0230aacbe1924416e4fbe97338f33a64cf0d
-
Filesize
368B
MD56ce02ce7f8fd5e8e2c5be2d088fa8a01
SHA16fc1239ad23992feaf6848c9e37e9948f8074a69
SHA2566d30888da9c77a622d52e09d302b27b29abdbba0a4d58b2b950c00503ff224d9
SHA51296dfae9f2d69d6ec2078d8967cbfbd50056be2de768691cb7376a046632d743970c7e799d16fbf020436b50640038e4dc760dd1b152902d4e6804e4cf12c9c6a
-
Filesize
417KB
MD5981c6cf9b7df281081e05c808cf0afd5
SHA148aabea85a9693f461f87e1bdb9f8e76a8b45c1b
SHA256639cf990e6246c0418adf545481ca1549a3ac1b443bb3ad3f5a3552400e41f0e
SHA512b6e668c33021b64adaa304a4e085a2c5c88c16c99e811a4c768534fd67cd6cc380e125e960de511c3abc33c7b842be1441a7dd48aff83c2928d62ebaf65f6adc
-
Filesize
417KB
MD596d208e818748da0a0510994de5be961
SHA18f093544c3ce04ef1dc323730d2937f889c911c6
SHA2569fab83f42fe2573d80524e4b91caffaee37f2ca37f56f6a97a2c626fb7927215
SHA51255a2b0c3a86ed751f31f96774aadebcf9068a4c3b828f0e1f4e30f0a5acd7a66ef14df7361ad2d9cccfe8f560db8e8cb2c67d9a459a75d24fbf762528f32bbf8
-
Filesize
58B
MD52b53b6b030d7bdb5da6ea0d501b6a165
SHA1fa4e9e8d724d91963a3fa3def11790559cac11c1
SHA256d8209526853a232417c586b6c130ed3ec53af8a2928b95d032ddcee37b4698fc
SHA512dceddb69f3c907593c47edd56cea3b5cd68e560f020244e6abf9e63c58263d38b36e8736617758f2c5c7292bffd815af44fee3805217aa9065cd143e0599b128
-
Filesize
12B
MD5a72efc3abeaa8da2539380df9721235a
SHA14a872d44a1ab1da9eb3f4be94037a6f714e2c1e3
SHA256a93b60ff21a7890f58388cd491fd4dbfffb91061dcdf9ba1823e78d18d76f3b0
SHA512ddb71571ff6effa768ecb67e43d477182a397ec1ab5b1eed7b002e561b455aba5d073a651396c79dda8b926cf5863f7f201f79885ff7e14dbfe49f3f74dbcde1