Analysis
-
max time kernel
152s -
max time network
168s -
platform
android_x64 -
resource
android-x64-arm64-20240603-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240603-enlocale:en-usos:android-11-x64system -
submitted
03-06-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
9276de9e07d8cf442b7d4d5ee5f4d3c1_JaffaCakes118.apk
-
Size
8.2MB
-
MD5
9276de9e07d8cf442b7d4d5ee5f4d3c1
-
SHA1
fe38fb6e27bf2e6b317e061b8acd84bdec95439d
-
SHA256
497b8c8e05e89e0bc538d395e2336627791b43a4c04c625072e17b47aa3dc37d
-
SHA512
b027c307b2e7d9308ac10f81e014ef870f6d55dae58a89e86cd40bc4b562817ad26f5b167b920c80ebed294c05f83c7a6bd9cec6e500a97bd3e98dacf1d83ba4
-
SSDEEP
196608:JI0KWSMhDJxCbUPzp6beG9hvI1DNujhvI0BUXlVc2lA:JBKenJzpMeGvQ98tQ5XrcQA
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.hrbl.mobile.android.order -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.hrbl.mobile.android.order -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.hrbl.mobile.android.order -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.hrbl.mobile.android.order -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.hrbl.mobile.android.order -
Reads information about phone network operator. 1 TTPs
Processes
-
com.hrbl.mobile.android.order1⤵
- Checks memory information
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Checks if the internet connection is available
PID:4530
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ff43720f51666be101b8f964b5738b7c
SHA162b322c10e0cd6dba562288596c90d95483547e2
SHA25680f38c681d2d5762bff1c6d0ecd6186ff5cce26053f0d876e6d5ae8d970f5c6b
SHA512fa9f119f624b177d6e1ff1cb415a95c568909d9ed5adb30310346c748f7ec269fb8603b4dcb583234552e86a3148658aaed012488f5d940f1a20487a0d3dea13
-
Filesize
28KB
MD5f7a76f4e1d75ec30236dac19159a240c
SHA130e99a7ceb1fd8f5709df0ff9d8bac510bab1083
SHA256be2290733af3dc92305e348cd52310ed5e3a8697999b9bd967543065ba57e06e
SHA5120ad7da3d2837717ee30eca01c1e4a6074eb944e76f12859cb8368a9e1d58fe3248dc175620f3c063c8ae28f3698a10473407a4519910629dee393955f3014fef
-
Filesize
512B
MD5bdc040ad876f3490c9a10f511d56824e
SHA1f3c9ba27f124c788771596a4edd0eea4f4085eed
SHA25697121c37ba40f9ab305b992a4d7c538e1bd22d8723166fa80a45eb4236dd23c1
SHA512ae320c5c09dfac9767cd644eff0b6b9b328d60839a733b61c63ac20366a10c010dc954d80375cb2eb0aacd813ef6401d216fab3522c0ac75cfb8bc72a9788572
-
Filesize
8KB
MD5fe166c9b4571f0228ed9114da5060d18
SHA163bfc545cca7f8273a3d010d2af8313efa7de408
SHA2564cfffbf123223b4a7cf5a4cafbe0460bcac59cbcdc034f5d59ede3fd6bdfd4c5
SHA5128cfadf9027eca6098a8390fa2f7e38fa1f3ed6686ce5a7a1b8df26e9193bb7432c3900aa2afceec5dc31da8b80bd01098cc0e8c04c512c47c94d0ccece06492c
-
Filesize
4KB
MD5d76862d53492f05ea539aae699920fbf
SHA123a49e90d49ac258c86452e9619a2983a2c770a0
SHA256ba6ee239bfc1e46d2b7684eaa2da908b71cccd4a46abaa9fa16a0ab378cf3d9c
SHA5124a1d0cf523db1d4d05a63d6c9f1cfaffb04f890f791af2e959be05dc3cd19615ade57836235e576427a29af3a0acce673ff79439eace243826ed4ba5735ba942
-
Filesize
8KB
MD5517e89c03e065a7badaf748b2f99f540
SHA149e1ca69e0715db0d27f06f971de3e2caced182c
SHA256ce2d311303452753abe986de132f297855bd90db02f119f37e6b795acff55ea3
SHA512fe51381e3b36db3dc75d0c19f0311640317f5c7b3729d94ac40a8b93e69d96bd18308907f083b5ca3dab021dba35c4180074bcf8489aa1379dfd0b9e520e96cb
-
Filesize
8KB
MD5f0c3b17a85b189e372f19e043deeeed5
SHA18c0ec1b5f186788934ba796ea97106dba8888737
SHA25626a911d24fd17d2305cf2757d66b09fb99987a98379d35919ef52a4873345d19
SHA5127281c7b7c1826dc8d168dcf889246a49607e6e1f89306029ff492c10b1d301b9fae5fb28c444431cfafc2bcfb45036a6a5aa05ae57d3c566a57d122b372f4734
-
Filesize
12KB
MD59424229e2ab5b46ca566c20c53975425
SHA16b7ccebe079b379ad4f65cdc28d49ac1801faa1b
SHA256e56c595e0913e7df7604f11cffe2a5ce41c056e0a41c1dde0d729719330bcf74
SHA512e9320fd2e4268e2f35bbb596ddcff3bcad6b2d53349b9b7b3a63796b40a213f6876497289dd1eac233245e4b43e11d98f839703ad557786229bed944dcec367a
-
Filesize
36B
MD5b5676b3ed12dacec0f13f3e8f2cf29f7
SHA17b51306e468ce916fae90cf26163174f8ea4cf27
SHA2564822a525a4ccc5fba95b1de69365048f49ac1a3e871dd7c592587a096af8c118
SHA512b64e56ad7d989da3653e19913d81dee21ef5fc0bf76c9a765504c684381115337f61b4c68d36442f7d0f2091f76d290ea7c46a34565c35a7cbc4ad2813a3eb02
-
Filesize
32B
MD5f70316c7cf714e70a8b81b2bdee23e93
SHA18be4aea584528ec50003619d909bfe62c7cf071a
SHA256b03108b019fcf6b34d497b46fa5cd1c2b705b252dc48938e853d60342ae2aa9e
SHA512957a76d6f87e9e94f96a627c7ee4c3397f72bb7d60050b5d247e3c304c671e9d26881067db3c3e63f8448d02f99bceed66be2f3c2fe444a39302be19a8d49f2c