Analysis
-
max time kernel
25s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
06/06/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
99e57351d25a205de078973320ac23f5_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
General
-
Target
99e57351d25a205de078973320ac23f5_JaffaCakes118.apk
-
Size
5.5MB
-
MD5
99e57351d25a205de078973320ac23f5
-
SHA1
f4ce9c27b9008015940d5c664243b899d1f8e0bc
-
SHA256
caa1447387f14558a31a669182dd9a8d779b5e69c466b5c8f9b71d511a1fc3a0
-
SHA512
aeb9dcf08a1c396594028cf89804473ea423d92ed6f3bf76659db400bb8f666098d399789988fc2d74ae213392a5046e6ece10f2124a28d30397780a4a5156eb
-
SSDEEP
98304:cvXxaZ6Am7OwcYdQ/8dQ/sRyw5TVXiztJ6vJdtHu7+eXZEdmTwDM6z2Ry+eCMl:cvXAZnm7OwcYBvTJYtJ6vJdhq+eOXMs3
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.shouyou.hstx.guopan/guopan/sdk/plugin/dex/classes.dex 4236 com.shouyou.hstx.guopan -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.shouyou.hstx.guopan -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.shouyou.hstx.guopan -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.shouyou.hstx.guopan -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.shouyou.hstx.guopan -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.shouyou.hstx.guopan -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.shouyou.hstx.guopan -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.shouyou.hstx.guopan -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.shouyou.hstx.guopan
Processes
-
com.shouyou.hstx.guopan1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4236
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD567e9644af22c48ea609a98103eca4ff5
SHA1d35536c78658427d9fca3407625a4e2d246d841c
SHA256edf54af35d3a5004cc84c05783ccc88d0b3f41e0ec9f907bb144718593d92b4b
SHA5120bf72771ae8e752cbe081fb3cada8a265dfc7b8a74f25fde4370fb3d68f13cd8fe09f0ebaa40fb7a9803832c309d150e766c0a1f47fb7affcaaf2c899820c711
-
Filesize
3.1MB
MD595f034cff01db1fc68c386e32eb06a7f
SHA190300080c93e3e5616f7f4d1a83630a394ec07cd
SHA256e687af74b0e0775cfc275d38868212d0fb877b0ad75385c8d575bb8faf43cea1
SHA512962fa648c05a66f48d50245de04f90ae83c48670785b0588d4e8c1e6d8ab09b6b8a7c8a51236fa47727d060f07456c8baa011fc448422ef3e132222e933caf05
-
Filesize
1.7MB
MD5ef2be12c4e1a1874636a3c4795882dc3
SHA1cd12cb2890d77553b221bdb6f4103e551e1b7e5d
SHA2566a887c2e654dcd46c3d602cf3fadab554ba38820adea47c5520b17b291e5851f
SHA5125ca09acddc8e0ad30d204b5529e43bfc349c21981da6e90249d0a3feca1140556f85f4ffe2c0827ec118d19fefd5047d763111eba9c238746ef53a4b1f5857f6
-
Filesize
1.4MB
MD514463df390168269f982456bf5948ca3
SHA1ae3aad30b31d8ff611afee8c02336ae450ce981d
SHA2562864260e4249aaaf9e2d6d38ab32e9305f3cecc6233395209e05cc632227e1ba
SHA512bc7a41e377cbadbcfef27ea1e4ad920439b2746a8b5cf831b0f04f9ed3c334f2a4a3c046404b43e3dbdd4bc604047cbbaf31b60bf5aef2619e028fb2cfe17d5e
-
Filesize
65KB
MD59a497ae4e3c021eadf67992cfbdd5ecf
SHA1c88fff749cd1fd7a0016f929b53e07e5c5c32a7e
SHA25694e68e911929b87edbe05445e6d3900a84fa1d4894baa12f0e98a8b1743836d0
SHA512fdfbc14441003661e02f4b5b59700cf08778a5fe35a605f86ab01501b14641e59edfe4cc14b4cc5742e98b1d2d49c202cede0fd0b2af1e86b5cf552b8d7d6913
-
Filesize
3.4MB
MD52ede52fe18bb7e30e2a2552d5f22c4d1
SHA18f10f5e587707d7b3d24cb21bb6dbbb3a158fcb3
SHA256f2cd0a8683e2785d2716dc7aecb08adba2aecee740e0ea88c5949cf6549ebac2
SHA5123bc05fd192f98bfc392221bb77691820f389770ffb71b06a3e283cd57e882712c5cdeaa35f2be55e518a82c8ed5db1fa901aa623371ef0882d2b935f89a0b10a
-
Filesize
65B
MD5e8ecc66c8deb1ce98ab4ad273a82bbfa
SHA1e34b5979381df240fedfc0bd23cfaf5e137fb9c1
SHA25600af873f622e88160c5b6d5645d0fa03f5a732e9c428ac5632dbace3f13d65ff
SHA512ddee35e877125d3e62df262dbcef0f88bb3cc00e5995b7b4c9961b526899ebad6753c18c38eaaffdf96da9321b6152306609c985a677fc8713e201c13dd698d1