Analysis
-
max time kernel
178s -
max time network
189s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
02-06-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
8f26478b0be3bff11b0044eb3972ff56_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8f26478b0be3bff11b0044eb3972ff56_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8f26478b0be3bff11b0044eb3972ff56_JaffaCakes118.apk
-
Size
13.7MB
-
MD5
8f26478b0be3bff11b0044eb3972ff56
-
SHA1
8a728e061434a50bb59388fcfef8784caea0d744
-
SHA256
2fd8269ddb71c8c748926d83cee1a0a63bb01a76af63915430a73711dc8f78cc
-
SHA512
c1d78c0173dcaaae0ca1e3dfe2018454b6bfb1fadbf5e0b56bf7fdebfccb6a44613e2a03eba3919649d67a59091f2127d4d75f0f9c17750fbae8659d1433fe3c
-
SSDEEP
393216:AzQheW3kNd2VDIxIPmFFTJ2FfIviHI+WIviHBJPnSyYM:aQheW3k8DpAF0GUI+3ULSxM
Malware Config
Signatures
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.chunshuitang.mall:TcmsService -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.chunshuitang.mall -
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.chunshuitang.mall Framework service call android.app.IActivityManager.getRunningAppProcesses com.chunshuitang.mall:TcmsService Framework service call android.app.IActivityManager.getRunningAppProcesses com.chunshuitang.mall:push -
Queries information about the current Wi-Fi connection 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.chunshuitang.mall Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.chunshuitang.mall:TcmsService Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.chunshuitang.mall:push -
Checks if the internet connection is available 1 TTPs 3 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.chunshuitang.mall:TcmsService Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.chunshuitang.mall:push Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.chunshuitang.mall -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 29 alog.umeng.com -
Reads information about phone network operator. 1 TTPs
Processes
-
com.chunshuitang.mall1⤵
- Checks CPU information
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
PID:4633
-
com.chunshuitang.mall:TcmsService1⤵
- Requests cell location
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
PID:4687
-
com.chunshuitang.mall:push1⤵
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
PID:4793
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD523e4856f7bc8566686d085a654fb97e6
SHA1f4c935ea533d37bbf52e9efe892fa487278d71c9
SHA256105ccb7629aeda73b16f68b0b092cf6d8ce47a474f07236daa6a8cc42e7cc224
SHA5127705d7712003b8b84976583731d67f83f00057af309e024a4cffa5058ea43d67c0f96913a72300ee54e09b2ae958ec29185d2f4da45390797c184ddc400d616f
-
Filesize
301B
MD5bbf3528bfedf14a8ac8da33150a0d119
SHA15797996c847d74cb927bbdfc4916604c26dcff61
SHA2562eeff95f1e64a691f36e74c8eadb99104abc3f8e072adeb7655ddc6696be9361
SHA512d329cbff9283983c26f2c2c09542afb6657ee71b363e897f0a4f67c45d2eb9d26b1cea62251e8a0a8410a9d9273232c9acbd3527738590d4809efdb08be00420
-
Filesize
328B
MD5446536d13a6d4af9c5d1669c287ff59a
SHA14ca382948700876f18f65bc365268ea18763a72e
SHA256464ee80e2b72508ec1e83b3182b81bf41594cc495e88bf8ae79badadfdd90e1f
SHA5120249d5ab00bdb8161f7d157edb1724204f7c30e37bb292efd2fb6d795a897b0427981340f4346638d95f70c924deff7fa80ba74b23c177a624c2ad7dc80fc019
-
Filesize
65B
MD59781ca003f10f8d0c9c1945b63fdca7f
SHA14156cf5dc8d71dbab734d25e5e1598b37a5456f4
SHA2563325d2a819fdd8062c2cdc48a09b995c9b012915bcdf88b1cf9742a7f057c793
SHA51225a9877e274e0e9df29811825bd4f680fa0bf0ae6219527e4f1dcd17d0995d28b2926192d961a06ee5bef2eed73b3f38ec4ffdd0a1cda7ff2a10dc5711ffdf03
-
Filesize
111B
MD534e878a4a3b6b438680b4813066fb141
SHA16d991084d2ee2688eb50ff66319551b931641f5e
SHA25686b25dd8856dc2f91dc85656e7ef5af4a0387be37a3e86bb31b4f0f2dce8b2a2
SHA512b202b742181cdde347980bf0bfd6a55f055a0ba8c3496063566fb61fd020d34c295acd129f2218731a2e9826a102fb76c40bb951a45ccc16714f655f510ab3dd
-
Filesize
408B
MD5a2729974b92d5be8ed90752cc6d74c74
SHA1438f314f116a498140ca6ffd5ceccdbff454cf37
SHA256ba35c50d93874a61de3e020f34f3edaf61f2e01f95521cdb7fd05607b73ce802
SHA512da272a63a3e7a30207a1b25c9f7d751d397742377deef01b88b2123541976352194b87fc629321e872955fc49a9043d168097a8237fcb9df3f413fbeec08f5d9
-
Filesize
111B
MD5847d6d9b76df8febd968f37cd4440624
SHA19d674b0c8d1c8e5debcdd9e8f1969f0929e5dadf
SHA25681f73dba63ba2c0230443eee6326794852655613df5e4ffa0b6aeb9707a96308
SHA512af780a2189dde9b6dce85a80575708bd7283a908e88b42dc15a909cfe6f0f856abfdac05764ba6412ed96a1b206db8ef552c45604e2f1f6a804ae6892dd68057