Analysis
-
max time kernel
47s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
10-06-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
9a6e0298e290d194e2e92285753daf67_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9a6e0298e290d194e2e92285753daf67_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9a6e0298e290d194e2e92285753daf67_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral4
Sample
alipay_msp.apk
Resource
android-x86-arm-20240603-en
General
-
Target
9a6e0298e290d194e2e92285753daf67_JaffaCakes118.apk
-
Size
1.8MB
-
MD5
9a6e0298e290d194e2e92285753daf67
-
SHA1
136709d6a53b1b39a0ccf27aa78f101d7de86629
-
SHA256
d2577719bd1817b27f5ea0f143ac5a67c238c5e7d93399dc960a4923e60bf45c
-
SHA512
ba030708c58f4b19b9fa29900b4e651dd92d87bfd7774c1c3e7c37fbb7d8fefaf7e9ae017755a70116d1c139c1b7260d56f761e5685c6effcde7e8f95d280b67
-
SSDEEP
49152:GYoUzylxv+RKuhSBicJkecFieMoJC2l5K5l:2UG6/JPecFzMoJol
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.msxf.localapp8512description ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.msxf.localapp8512 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.msxf.localapp8512description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.msxf.localapp8512 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.msxf.localapp8512description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.msxf.localapp8512 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.msxf.localapp8512description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.msxf.localapp8512 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.msxf.localapp8512description ioc process Framework service call android.app.IActivityManager.registerReceiver com.msxf.localapp8512 -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.msxf.localapp85121⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about the current nearby Wi-Fi networks
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.msxf.localapp8512/files/__local_last_session.jsonFilesize
97B
MD5b5f457a26b047044648e82d77f049e40
SHA18880fd02f10a18bb8ab8c828d6ab4d6879c47e80
SHA2569f15fa818752fa23a548d073a7973d379e284f2537226bbd97773939363074d2
SHA5124cc098cced169811c462edae8268dbbc9557a78eae8b2cad6747f0b9110f5ec87f799568cc4a46fb9110519cf8e63eaa11531ae93c2eaba5a0ab125a8290af42
-
/data/data/com.msxf.localapp8512/files/__local_stat_cache.jsonFilesize
25B
MD52d805b13f2f28dc3ca9bbcc000f49bb5
SHA19eac165b4d81258fd3967cde5cc53b53b1dabcb1
SHA256c8a6624f390568f0ddcb9841336aec6a564460fdaf6624e562b32935b8956f19
SHA5125db8c57bab36bcf9db698c1dce70318cbffc156dd1d1c1e09e5b7ba60aff07b598ebbf26c4bd8a2b03bd6e59ef2dde2d944a22a8d8a19ecc8378e83afb7c83b0