Analysis
-
max time kernel
152s -
max time network
147s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
03-06-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
-
Size
8.2MB
-
MD5
9276de9e07d8cf442b7d4d5ee5f4d3c1
-
SHA1
fe38fb6e27bf2e6b317e061b8acd84bdec95439d
-
SHA256
497b8c8e05e89e0bc538d395e2336627791b43a4c04c625072e17b47aa3dc37d
-
SHA512
b027c307b2e7d9308ac10f81e014ef870f6d55dae58a89e86cd40bc4b562817ad26f5b167b920c80ebed294c05f83c7a6bd9cec6e500a97bd3e98dacf1d83ba4
-
SSDEEP
196608:JI0KWSMhDJxCbUPzp6beG9hvI1DNujhvI0BUXlVc2lA:JBKenJzpMeGvQ98tQ5XrcQA
Malware Config
Signatures
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.hrbl.mobile.android.order -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.hrbl.mobile.android.order -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.hrbl.mobile.android.order -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hrbl.mobile.android.order -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.hrbl.mobile.android.order -
Reads information about phone network operator. 1 TTPs
Processes
-
com.hrbl.mobile.android.order1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4983
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5ead32d8cc91ddd6fb8e2af3cd867d8a3
SHA18b682a2174abf7d4cfdef792a8a65e25337fd7a5
SHA25631fccf3477464cf27618df82842e9144b59747a7ee13dff7fe57d82fba4a0720
SHA512550308e2449f9e9e180ce619435c298be1d6f7c9d5d64e9accdeeb7d636edaf73e72df71ba466b3d30d85b1774cc4e67794a7319c0d70fe792a55630d41674e5
-
Filesize
28KB
MD5ddaaca904fe987d8c3c98a11c83f331c
SHA11ffdea5e4f339b213bed6e9828ed259f9018aa16
SHA256f8cad5a73cb912f4f6cb42599155af99d4496e2c6687fc9a378c1a20557c0190
SHA512cbd41937b43d0fbf8466bd96c9f87d9cb6a36fb562d7c55eb8b3ac883fea01f1b8fabf3e1c2befc79e84537a87217ccf7a9e8f1cd7b795d775e5f44742c006e6
-
Filesize
512B
MD5d68827f67a287c7fdbd5f4d1415ffcbf
SHA1b7d7c3d428643a8e48cce3c37bd2b27b8e4972db
SHA25610b0907fbdf163c7de7f7c44c90e3ba0020c23b409eb6b8cf32194e1df1a7558
SHA5121ee10d1aa17c081acd7d8e195af2082f2cef60b52f62f06c4b91af08794355ed75a3e445b6332abbc38f81359bed3ac3a968f821ae70d54695fc179dd15f6e28
-
Filesize
8KB
MD55655470353b6de3d9fd1fbc9a96611d4
SHA11f679751b51d59d2d1a30b5e0bf1984902af8ad5
SHA256247905b2638a21a1a0c1fdae37de23c6072c1fd258e5fe87d4ff6420ac79a067
SHA512c35338d4b38cfddfe4af3a1c2fd57cb667d67a2ee5faf6d1ce5e41c14083438ba8bdc1314a59b56f60480cb6bf65d7a99251c97bb9eaa36706277a535a552822
-
Filesize
4KB
MD5722d6e5b93510095fe3619df0d29e81f
SHA16e1889a052dcc284a098710846dff53546308877
SHA2563a8653a38a391994fdb2cdce12b9c638ad4827ed0233cc8e4975a35e8571d40c
SHA51217386ecedea5fc995fc1070e99b116705de737a24a846d6b1790282b50ecfa3c8d06f8c0fbcebb7f084310e98c7818bbf2495de3a5b56091c3b5b182c61287bb
-
Filesize
8KB
MD59b0bcdb9f421f72cc31e35763ee47dd2
SHA175dcd077d83e237371c31a2ff9bee61b96a168e5
SHA2564e961ac512d5fc26a6ec2a991d1fc3691d30321af4cde266ca770b5946230cc7
SHA5124edf9500b74ec1ef4e92c2c2e1548a97225c5b7f21b33430c53ba5821c2ebec1332729249b9c4c2e31b3ec6cba31a0a8a3ab0c85e47d0396f198146db0299aae
-
Filesize
8KB
MD57a2463ef4d7260b1a1d4df389a08f9a8
SHA1ed5eda47da571817bf7592da87637e2672e0b688
SHA2566b7c2812c2469724b64318f27cc4bd861e9845add7f2816cb8685f1323167f69
SHA5123b3bae4e7e141622deed8ec6171ffd3dfc7b5553611ce1894195752f795bd25ef475eedb39dc23ec5eed991757342fb95f9e5e035d7c07e0ba192fbd438b0ab7
-
Filesize
12KB
MD50a54b00c7296ee40755d1a83788b35e9
SHA149a433f23b7915be4f0afff15e08b0378868ccef
SHA25681d4b385b70ed831763313a497904f2b6d945e794e9035f21b28013ebf2d0400
SHA51240a6b8c624bc49c7293cf7354a8f8a1987d1df72903226338595fb918c7539bad549f73073fc450398056486517a6b8daa6d9721e676281febfaf6e129925662
-
Filesize
36B
MD5535b57eabc33873c5cf60ab0d44a8bce
SHA1dd1014c816f451a07528c8f75efd39cd2c075966
SHA256dd41d8b41d02bbff594227e752aa327cdad9d683f504648c0de1f1e327aad91a
SHA5127d39d85d1317737c0304a89e4020c5ffed145abf19eaca05b978c2c354cd1498b6ca381a68af995a8d41058ee64b39c9a8baf33fe5293696a9b29c5ee2610787
-
Filesize
32B
MD5b6c6f5acdf428964262d35a287b02261
SHA191f4186746d93393601f703223af16043f5d64f8
SHA2564ed177b427fff49a4969930b1e0fddfb508d4b752f1f5e06c516bf523a0a53bf
SHA51287f916d6e1a44283e8860005dbdbd2ce7c19b4780e7d64e493dc79466d8c987722990e5b37398f2639dead197ff03c23feec9deb0843fa26ffef3bfcffc45ab6