Analysis
-
max time kernel
66s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
03/06/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
92857cb00820b9f2c77e958abd66a8d2_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
92857cb00820b9f2c77e958abd66a8d2_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
92857cb00820b9f2c77e958abd66a8d2_JaffaCakes118.apk
-
Size
10.6MB
-
MD5
92857cb00820b9f2c77e958abd66a8d2
-
SHA1
de8c76e8a8f0711e711bd80e71a0132a0a961488
-
SHA256
9546795f121025fdf2a780db0ea7d49985e146afe48628dc5ade0129284061eb
-
SHA512
07409f0baf5d00a8b8c1a263526beb78a02253b88827cc1043b8cba7942a7789622b48b30b7400e849fd5fd7fcb085f50f1deeb67307cf0ab2a877edc8d55c69
-
SSDEEP
196608:dHlhAQNtdMj3KypL0i/8LvMGkbYCbdFllMJ9HZPLGqpkFmFkJZNSEtw+2xT6t8Y8:dH/AQXq7KM0M8Ti1bjXMJ9HVLGCkFMKg
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.brixd.wallpager -
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.brixd.wallpager Framework service call android.app.IActivityManager.getRunningAppProcesses com.brixd.wallpager:pushservice -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.brixd.wallpager -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.brixd.wallpager -
Checks if the internet connection is available 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.brixd.wallpager:pushservice Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.brixd.wallpager -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 6 alog.umeng.com -
Reads information about phone network operator. 1 TTPs
Processes
-
com.brixd.wallpager1⤵
- Checks CPU information
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4266
-
com.brixd.wallpager:pushservice1⤵
- Queries information about running processes on the device
- Checks if the internet connection is available
PID:4297
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54d4920f011f906d61880de2a8cd85fc3
SHA1a87277ada5e1b6bb36ddb400bb1df601fcf1e3dd
SHA256fe221c523c7873b1d803218da4966248446ecc2bb30687ac79c010e787440eea
SHA51219075994580530fe82edb25b0bb3f37cff7d0d99c25fefcc9015f6a1d944058373126af0ed1519f54d5a9f45ff5efac295282c9e109701c228585c6ea2dffd47
-
Filesize
32KB
MD57815fdda1d6d50d4ac69d3b4b6bf008b
SHA1d7d6ff4770867790d55acee8727ff1e3155d77b2
SHA256af11f11c5572ae9baa2f49fd50559784cb163af68443f44563b361c9093b81ff
SHA512fc92e0591c7eb3b7d157a6bcc9c1fc0d40ecc71ecba5a735d49f6b382deb11bf1d92d806bca6a01a271066454ff189d4660c00155b4ca7f97bad7e66511b832c
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5804a612742acc8c935bdf07aca315379
SHA1992830094a0984959ff3b438889cd1f84031ea4f
SHA2561a52574f2430b1aced5d959a03fd7b31d4408738629b9db0afa48fef4e853c53
SHA512790a2b6aaaaed691f77fe24da053f3c1c37f5299ebf95f061a9f30fc70b66fb975b4d15932923a31ed73a03ac14b5cef218f8a7d7c93fd8290a0d088568e8332
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
88KB
MD50f0dbfef16168bd97e539a053ef30cdd
SHA18c5626783a8534a43925aaca1d274801b3961e9c
SHA2564276370914c27cc345d505891c76daacbcd288e8c43f8e935dfa8e995933f338
SHA512f0efac5a093206146018238c2639113574df36bd2755b5aeb3733a77ada697700da403381dd20a64e5bc9d1793865ead1604981d8b3cfca99e95430b046c5a55
-
Filesize
642B
MD5086ceb99a32123df7aacafe2bf41190a
SHA15d5eef9095f5b46b1c66b8c9a58b0f68d2152eeb
SHA2569bb6dcf440252bb168e225ff6902957936d22b6de30ddbdf0463ded263736096
SHA5120902eed15167d4f02952652e80b68c4f42ab3fd9c2a4bdbaf0455e668e8a29f1db792f9fde7ff4fd5b6ecadbcf08fce8bcf7be52ec6697265b6645c3583f0d3e
-
Filesize
310B
MD51787fe69db99f4bfeef6d2675db903ee
SHA1b8ec79da37f291aa435fdd9d1a932d38e1e7d353
SHA256b3228d5a1cfc1712e9fb1ec1e87806f924698cba773f311d2ec4a51297a44a7f
SHA5126c188829b3e9f88be0e5e0f1dad1ca44fd2e265da473c4cc55ca8344890dee30b3d6b5743d5482fe936eb621a3dcef04fb7756d48e02d16ff8873156a9fe4ccf