Analysis
-
max time kernel
179s -
max time network
179s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
04-06-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
93180381acdc9d04a9dc73535ea6fbcc_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
93180381acdc9d04a9dc73535ea6fbcc_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
93180381acdc9d04a9dc73535ea6fbcc_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
93180381acdc9d04a9dc73535ea6fbcc_JaffaCakes118.apk
-
Size
697KB
-
MD5
93180381acdc9d04a9dc73535ea6fbcc
-
SHA1
341f4cbe80014892f47d282bd145250c9ae47ba1
-
SHA256
eed27b67213d85848905bf61a5a117253bc623686e78923aa4f87c5e5431724d
-
SHA512
b0c2c5d1cabc397b551214a54483a5d2d7a4a7603e0badfea5d2739d48b8fd04e10df1b00dd37341843ebae240b6b86d1a924819e091fbb5ceeee19b5a939cf2
-
SSDEEP
12288:q2lsH0pYrDA/9ybLeWDjn+NZNMjQzdvBbeiTCLi7Q5Cvvk8I9ksjGn50:TlISCD+NMjQzdQZYI9kgGn50
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.hsdxlpwka.zshvfpioc pid process /data/user/0/com.hsdxlpwka.zshvfp/app_dwuaubfhob/tzxvzxenl.jar 4998 com.hsdxlpwka.zshvfp -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.hsdxlpwka.zshvfpdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.hsdxlpwka.zshvfp -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.hsdxlpwka.zshvfpdescription ioc process URI accessed for read content://com.android.contacts/contacts com.hsdxlpwka.zshvfp -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
Processes:
com.hsdxlpwka.zshvfpdescription ioc process URI accessed for read content://sms/inbox com.hsdxlpwka.zshvfp -
Acquires the wake lock 1 IoCs
Processes:
com.hsdxlpwka.zshvfpdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.hsdxlpwka.zshvfp -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.hsdxlpwka.zshvfp/app_dwuaubfhob/oat/tzxvzxenl.jar.cur.profFilesize
198B
MD5e0bd93eb4255468d9a8ac671714760ff
SHA12e940334e1eb895271d60cb8627557dde55e1460
SHA25642c4de54b150b7da928c92b4f499dda066e9c1c69c67ebf5d366f6e09ed20db7
SHA51216aef5c4b1baa3da38b99abba9895a17a3c4f85d4b5b49713f1ee9a01cd5906fdb152a6641acf853e3ff54f51b1104e707533f3961ff72c351ea2514498eb743
-
/data/data/com.hsdxlpwka.zshvfp/app_dwuaubfhob/tzxvzxenl.jarFilesize
78KB
MD56d1ec70684bd943b2891bb83d6c17aa6
SHA1a13d8f9e7f0327f693f3026e45608aa014661c9a
SHA2560559ae0fc3dafcf2d4f4744325b782682da597c7d3628bed112f0c7344e83cfc
SHA5120c853bfd54fe4f94ffaa2dce41ac92b4b28944eec50118ec56f397eff2ab0da436000ed83daca73853b1629a09babbbd21b7aaf470ae8567156a9583ae2d8028
-
/data/user/0/com.hsdxlpwka.zshvfp/app_dwuaubfhob/tzxvzxenl.jarFilesize
179KB
MD5aec2737ee9622bb4d6cfc0707dff4d14
SHA1f92828999ca098e1e58d50da8d1309dae53e8f15
SHA256f62e571f4f061eda53c50f7475a8da0e6b037a2e2c14796666e0cfeec1156c28
SHA512b78d80167cce29c3919c94faff158aeee036a67401a54b64c8a1486779a5e6747c662ce6d535cbc900f710281fcdd67fcfe751b6afdd4856e5605e61d0de24a5