Analysis
-
max time kernel
78s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240611-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611-enlocale:en-usos:android-9-x86system -
submitted
11/06/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
9f090d6c2cca4be43cd50a76dd38389a_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f090d6c2cca4be43cd50a76dd38389a_JaffaCakes118.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral3
Sample
9f090d6c2cca4be43cd50a76dd38389a_JaffaCakes118.apk
Resource
android-x64-arm64-20240611-en
General
-
Target
9f090d6c2cca4be43cd50a76dd38389a_JaffaCakes118.apk
-
Size
2.2MB
-
MD5
9f090d6c2cca4be43cd50a76dd38389a
-
SHA1
7321dc547baf5cede26039e4984fc049b60c9507
-
SHA256
b689dc52ef41bcba6774ecf3e269397be82ea5cd85cbd4dfd5df4acd34bac845
-
SHA512
e1494f1c500e54a4e9317e4e38f027e9e5ca26343f00fac0c1340711ea4dc2a45479c15f1522a8a15ddb2abf4ecfee239bbd82f37967185521ec9b0953a4267e
-
SSDEEP
49152:79v6nGVZ3g4KWUKhHf7RQE1mmzij5s/dQULIJ4KPnLpqYcl:7J6nW5g4HUKtRV1mmzUz4Kq
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.application.prosesser/files/ob2.zip 4270 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.application.prosesser/files/ob2.zip --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.application.prosesser/files/oat/x86/ob2.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.application.prosesser/files/ob2.zip 4244 com.application.prosesser -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.application.prosesser:remote -
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.application.prosesser Framework service call android.app.IActivityManager.getRunningAppProcesses com.application.prosesser:remote -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 22 alog.umeng.com -
Queries information about active data network 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.application.prosesser Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.application.prosesser:remote -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.application.prosesser:remote -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.application.prosesser:remote
Processes
-
com.application.prosesser1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
PID:4244 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.application.prosesser/files/ob2.zip --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.application.prosesser/files/oat/x86/ob2.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4270
-
-
com.application.prosesser:remote1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about active data network
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4309
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55d7ea1a23af19b4340cc8d90f28297d5
SHA14cfe95b23a9e98378d69c4290af81b51fbe76aea
SHA256474c4a54534ed96beacad7cc9a805a3f53ec9c0522fc7bcc59771cf500a6a0da
SHA51233071f4c92da0a3df01c4a61dd165df7c7e0f4f37753cafe02d19fc876a5e7fcbb01c069c804e140ab8bfa0644a55f50fd1373646d1c439f817baa5ffbd47f7b
-
Filesize
36KB
MD5ce6135aa1b1fe4f2c2db2a546d2a5558
SHA179b59582154017aadab783dc266fcb158c252940
SHA2567b45f576c08c7f78220168cca4a0e33198b13e9bdc8b1da406ddb6887412000c
SHA5122839075fe374c8567c839ae35ce2d33ec72fdaebf170aa7d224b555e5b0e74d4a43f2f67d17ed806dae841da883e9620d788ea052d06152678afa927307c7ce4
-
Filesize
512B
MD52ac26339a572b56a4bdae194b9d296ec
SHA1ab9f5dc6a6c95149dea94ef6adc7bb9095f20a8a
SHA25688dedc3bf70f6dbaf906ca31925dccc892b814a806635ecb20c6e757024f0de1
SHA512dc7df509d91676fbd1ced36a5a427140ac8c9671b8f767e92d695079987d45c11037f01f08949a5d1b27c4888bfd180d96c775afa323728d9f5b8d65f074e0a7
-
Filesize
48KB
MD5de33705afc61b8094981a630da85c309
SHA1b165f641b232408cd5783ecf7ccfafa8efd5bb62
SHA25617865a83321f0f6405bd021ba0de2df101450e61915e8f73d8f48d06b4a3498f
SHA51229b20027d3c34a6838fd36299d85f7837a51f783192907ddd3ca6cb375333e3e588ef4d40e8fbf2b6185e4f975e25d4ab3d3a9572af9d0a8e6c81ad59d0fa79c
-
Filesize
16KB
MD52b0d82229f4a5f0c17036eb14ffdf00c
SHA16dbebf18cfce689e24f3dbd6b5fcc9af7d0f7cc6
SHA256c83cb33f302a1055611e3fe1988eeef849289ce918d3ace37f5c9cfb0921c029
SHA51287a192d966fb352833302686d6e3b6bcd9bde068082155bc84e130bcc2dc52fc0726ee5410cf6d4f95e26afdf03e853056ed65030a1b07aa40f5b9b1463bacf4
-
Filesize
32KB
MD5d604a3bf1f8d992cc320ea5b1f7609bd
SHA1247f88df0b55c7d523ea5398637711a0e4a483a4
SHA256329940b4d46326d58e73c842dd099704061d0ef7338777bf31ad895f29013c17
SHA51267e28f6713cb5c238a9664df128f01a89a2efb7c8c9330c1e45bc0d40ebab81fa20df5166743d84d81dc0386a89ff0329f022281c098339baa2e851ff0a1e1ab
-
Filesize
16KB
MD53a7117e47f85f8ac6875a503c7288e5a
SHA1d38df1732a7a47691628dba7f967a9539820840c
SHA2565c8204e407c57e67f6221816adf1047d3dc58959d975a19ba870fd19c4db0d2f
SHA512066ca37fa7073323486d7320dc23dabc5f8aa12c526876105181ddd2fb757776670dc4652ce67a5a43d9f4453e92acf343d7c907b5dd6d937ec4629ad724cf9b
-
Filesize
32KB
MD54d296fb09396aba82f574dfc09054475
SHA1b47c0316dacf7e56a00c9f0e87a2e280f42ba771
SHA256e74963ee3f05749d692620421771258a55ae109c789dcda32513dd99a80756db
SHA5124a758bc6df016b159f63abbdfa237eb5a062232ac235231f2cb36dae8814ca829ece6e4f1bbbc8140bccf6f3fae283278f1439c143438a252ffc241db8bd60a2
-
Filesize
512B
MD5b7238a2fbdd246057e1d78d60133074e
SHA1b402b92fc8c04eb28ede68076e8c297c16639638
SHA256e2b6a0210ae81d2bd2352cd2fdb818d265884637223c7ec9359e2b73ac4a5252
SHA512f6fb19c79e09afef22178f3c6c5bb3f387bc8525ed59053b25b53b4b8137706ad90ab9244f6f5b28811c2c5c0d43f5d4bc411ad9ced06db7f9524a0b69123861
-
Filesize
8KB
MD57e1035a907b340ba53cc3079a2f185a4
SHA13fb38b6c770c95be59e8f62dc13ae636231c72a2
SHA25682ce5ea4711f9d2ff31a85d9eec3f8a84c0c9baf92218bd2765fc209f9a37109
SHA51270bde8186024e38fe0becc6479bc09dac1f84cd04c66b0afeb8a52a1d8fc19d3d418b7227a2fd0d2ac3ce4103dd01bbe6137d0e53f868deba8a05c012d786624
-
Filesize
4KB
MD59dd3cef02b61266918afb8124eb99fe2
SHA13916ae89a27f9903ae0156f192567ce57e77dc2e
SHA2562b3b1e276274177f8e840705d6c50312e2cd39f07f07437a5511a07eea17cf63
SHA51266518da7a13d94107d1cbd0963a3a5f3b6341b0bfdfc3b490480a18d2972a82ea043eda69a51cfd0d92756adb43a281600e8cd700ce1806c13d94f4131e13c68
-
Filesize
512B
MD531465d291409bfaae9e1c546b03ca2f4
SHA1cd4dab42d96fc3b065ce2b1b2b9a412003812963
SHA256605abf861176093fd9bf9021c01a204c0b2cbad8a6f7cc6b7f514de21a9d3b99
SHA51276b7c30a2b1754dadc7b0e9f183c92b9d5be4234e30c754c14beed2c99c9a29f45c8703bceb26d77ea78e7744bb952ca8137fd97f325eaeb79e719cc006e10aa
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
40KB
MD51c76d17e359a6ceb43fba1a528a6158f
SHA1c62d4fd8ecf3a427e12dbfb08a6f996103d8d218
SHA256f50ef0d1387f944c599d0fe549a70e898764800b21b60c8ad1b7fb7995d9b06a
SHA512158aead9c43587ae227d5dc750b0902040e2c1beeaa28095c64728b4bc166d73370a48b0129a73de0c555fd715f22a759aa5ee270e9524db16a874c90aa3eb2d
-
Filesize
1010B
MD5662ece6a876c95c55e6515b805276246
SHA143a77a485c281ecdc9477ad1300fca456fabd02c
SHA2566f4b2decd275f2e1cc2c495ebb58b35af09141c4b725cb5e5fc6e9cf8e12dd6b
SHA5125485b51e5c676771a9898cfde1cf80b00c354a88426ce07edd758d1fad52a6f1a134fd97c8e9364b10effe6afefdb77d823dfd185ce6d8534ecab968a8856a2f
-
Filesize
162B
MD52f36d05c9cde4434feab7a66d6fabf3f
SHA15112081681bc6a24c455b793476425f394bfe296
SHA256b4f7ead8043650caed6f038ef4939a42fa5dd93293462648cbcd2e6ebfbbd10f
SHA51272e890c002bac10c0bd9b1727ad89b1ca12fb509f05eec5e1473aabfa233750b419900bdacfbf58c47f4a9045be0d3d43e7c19adf8d8b8804c3f299af72949b9
-
Filesize
56KB
MD5b1c5128d0daae9e6e0ba94168fbde74b
SHA1c47645c5f11a5e5009f75e2bbed83c4a037d41f4
SHA256b649c4336451715f5676fff8ac77ed352c6081f9caf915d538cdcbcb701dd9d2
SHA51289c8e4d53e40f0f413d22daf38d7880f8919eeb2f8ce860254bfb90e5847431f98b0b457c6e53bf17ce4e50b42287f1ef5a93906d03787eecdeef323661e633a
-
Filesize
61B
MD5baf96a52a70b967a5d09ed8b65b6313d
SHA1e93839270dd6ce115b03902c078f930c5e82d1b6
SHA256b8294a2c44b6886d4e6715dd49ed2cccbbed14022d6a2b9117b87f4f9058dd69
SHA512e31e9c1ec24aac50491c746f5ca57e9eee22f448e5a70c436c91c5b200f44a6ae8399264ec1eb154789489cf3d6c79fbd72eef37321bdc93e04acf136f5e4abb
-
Filesize
12KB
MD5f03f32d7d7924b032a21d5e65938f901
SHA14e88d04e8bd002372ec347968af8037765262e4a
SHA2564dea4e3b96bf432f7646b7ca4222ea171b994703293bf5bb3d782950c0388a0f
SHA51285846e5e84a27b874c28e2e44590cc373a96a329433bc1dbb3b1b57db14fd494607ec0c95ba1fab0759c72ab142386b8ec04b32188486fdcac60d0bde853ce29
-
Filesize
413B
MD58c50ac589bbdc9295576703cb5b648d7
SHA1bd04e55dee8419e23dc5ec971669f4932b8f0ea6
SHA25656649bbdbbe5573989b91a26c8bd3949826d490e17c8c0080be01f85d2834a1f
SHA512151fee2add92a1714adb671341c2b77418b9cb9582f3f3035e9efe2f43d9e53d9736f1ed4ca1915087ac2e84084fe2cfbffe9e8e307b31b97bc9926d42b73587
-
Filesize
210B
MD5860a264aa75bf5d8fb3b162461e322d8
SHA15040daac556875168e0f2c2e2f601f0756912a22
SHA256871cae24f1372b2036ffb7dcc85783371313cfab06c901b3272c6c889c24858e
SHA5121af4eb6dc61e562dde98128c9d451d0c982475ac97ac603f34c2d41a9f198871dfe901e5fce4a634ce352af7efd368dd540e3b85e1758e014e3db4888b9122a2
-
Filesize
17KB
MD5d2cf75ca717b8ccf57fc201f60a887d3
SHA1f83574bced8afb5e72d787487bfc5fda196d0344
SHA25698adfff44beed36f7958d488ef2f40deff73d56d7beac71895b6609f6428c162
SHA5122efe9438b46a02868b574af535bc95767de5e11185648720134c34d697fcbeca30ac876b87261ae91e49a7b939ae4b276d373ab1ca66a5f8cf89a61a3ac68bee
-
Filesize
17KB
MD592cc76d25fbdecb03087ef1f9a6bf403
SHA1d5c5ec91ed370646345d75d95c42e9286839a3da
SHA25691589b64bab049d42c7b86ad2ec9c5400ed11539315d8c09158a1fb56cea9fde
SHA5120a75330d272eb0db86a11cdd91a9b2f58bf23a8270359fcc196007f94887d3763b5b2c88b98815c9043cedaa065e37d306e23242446b0636b10aea79f451afbd
-
/storage/emulated/0/Android/.04484682704385bc3978a66744cd88af/config/4b55408b66d30e27bb1593401072cd70
Filesize32B
MD5f1f3238fa0a68ed5528426d028961d39
SHA10684d8eb02223a3b7f61f417b16b140d134ac2ee
SHA256aeee3f144f7766090c5e67f5fb67d53a9ec4b52e43fff360bb7a7e93b421ca1b
SHA5123a413ed44b77320d0c438d78fc5d52874e2243b5f365357f3d6cc43481c491fa649d48aa9799bc24b467e6c3ecb11ce3c1cd81be14cce6019ab091ece712879c
-
/storage/emulated/0/Android/.04484682704385bc3978a66744cd88af/config/83f760269276683211d805cb5a4281cd
Filesize80B
MD58f27d3e7d2556c0d903b6b3e76ddaa88
SHA16286a9feaf99733ed44db8761d47f029d9a0a446
SHA256df7325068ba4539ca5f3487161a2ef1288e6c7b9b7e5a3e9a6242655f38e63b3
SHA512cdcc6404a0a662e958ee60cdd47b12d96701f1226f93a87cd694d548e2fa6dda46dea9675c5d29668e1fb7f9d4a7ae8dbb19603a02ff6ba591ef982c09afca8b
-
/storage/emulated/0/Android/.04484682704385bc3978a66744cd88af/config/e68dc6d37bbe5f40fed85418ba064019
Filesize864B
MD5eec40c0bf8e1a29caca4f2fb54cd0be3
SHA10e3f57128a68c4ee1e055aef15d96879061913c4
SHA256540a69e1446ca163ad9edbf04eba7d29f771f9153afedc1267bc8674ac6c4a14
SHA512699762130b1a8754488d9e8829545f45007659806d633e2d8a81809be56f76edc1ca57dadba9d1f7d6006922e0c5fe36b40c06dae24e74facee261347518a027