Analysis
-
max time kernel
152s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
03-06-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
-
Size
8.2MB
-
MD5
9276de9e07d8cf442b7d4d5ee5f4d3c1
-
SHA1
fe38fb6e27bf2e6b317e061b8acd84bdec95439d
-
SHA256
497b8c8e05e89e0bc538d395e2336627791b43a4c04c625072e17b47aa3dc37d
-
SHA512
b027c307b2e7d9308ac10f81e014ef870f6d55dae58a89e86cd40bc4b562817ad26f5b167b920c80ebed294c05f83c7a6bd9cec6e500a97bd3e98dacf1d83ba4
-
SSDEEP
196608:JI0KWSMhDJxCbUPzp6beG9hvI1DNujhvI0BUXlVc2lA:JBKenJzpMeGvQ98tQ5XrcQA
Malware Config
Signatures
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.hrbl.mobile.android.order -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.hrbl.mobile.android.order -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.hrbl.mobile.android.order -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hrbl.mobile.android.order -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.hrbl.mobile.android.order -
Reads information about phone network operator. 1 TTPs
Processes
-
com.hrbl.mobile.android.order1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4283
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55017bca718dd1f5c3f796f8ef031f51e
SHA1b679e5e61ab361c95979cfc83ce93957ab7cf101
SHA2568a9c02f744b43ba3ab42e88d6732365be44a6d7615486160e1fdc877a7410efa
SHA5120a7422dc8f99deb4acd4f409f292781315f269cb312d307097055a526637e368ca5f725d4dec1223c0bbec46b519089e5795991c144fb43bef58c8d1e07dc248
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ec9352c664d62e026a5fc108fa06c4e0
SHA1c68c44ed9d720d93078edc2610b299819a6c68f8
SHA25692d398f2ade7c1d913679c65fb22b51a5385f214fe15ee5d82e980137b1bffc4
SHA512d2c7de84ca18df1a77525eb3e86fffd69bc90a243cd11396672f43ffd1951374e8bdddedc54f5b7670b5fa14cc0224b68bfdde7e9975d6b41d247c5d13e814e4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD5b9f5984f09c6c55bd9182221367abdf6
SHA1d4fe261d17a016b045924405fd6a3620b1a25c64
SHA256b15b81aab6b4bda320f3f6f34ee00c4589d02874a1bc0f1acdc9e9cee243c056
SHA5121b1814bf048af33491ef929d6f682ad83773d5d74455ac6f9546d09191a55a7cd7e9bb77df39773068e2224db5fdb624ef20b4c0abe0c3adc0a70c0112fc021b
-
Filesize
36B
MD5ccb6e1d28cd99d2afa66f582bfa56fb5
SHA17cd0ecb8dde76d6fba4c43823f0bc2983a812b4e
SHA25640651ddc2c1e9fd8de7e137e5647b91d5978a92953b1cdbad55205011285b4fe
SHA5125a1251c2bb1ec7ce335c6b4b8e3682a822d29f6c9d0dbe59d91e8c9f1b724997317fda2dffe35f0ec9d00cc0116a93911a681aa16033954640ca6623b88baf0c
-
Filesize
32B
MD5b77d543d5969e97729e5c2f0b604b777
SHA1c6f17ad9f7e6d6c9a35b0b2590178d6b848f4502
SHA2568cea65e41e89d00e7a9053fdc5cc9fb851496f6ec1e60de50045b3722c8e6a8d
SHA51203e40338bc3ad9e05a25825ae7df404f8a2d27875bd027d260908c94d83f549fa57ea7ca7f161fe6a5bd11f23ae034c33b8924b243656e5b78c941c662e714dd