Analysis
-
max time kernel
64s -
max time network
146s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
12-06-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
9ff03f062bb0c58fa11380c290183b5d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
9ff03f062bb0c58fa11380c290183b5d_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
9ff03f062bb0c58fa11380c290183b5d_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
9ff03f062bb0c58fa11380c290183b5d_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
9ff03f062bb0c58fa11380c290183b5d
-
SHA1
d19743f4caaf2ffe6aeb7afac5085cfab8a0693d
-
SHA256
9f2043d5389728cb360c132e260c6fc61da58faa040dfca8f92395d6f4d87d6c
-
SHA512
ba9e9475dbe9dce41a783fe9091edd50e9782fda7ed6af42164540cd727fd32783964ff927b62e78225b0b206f6438810b4c268a10b5ecafde235a2826e95b6a
-
SSDEEP
49152:WHwAyxaFeaCHfn3C9uWv3Pau2fn5kJpvjDbtPBXiKr+pnQw:PA8Vdn3Gv/4nCJpPXo
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.yxxinglin.xzid129039ioc process /system/app/Superuser.apk com.yxxinglin.xzid129039 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.yxxinglin.xzid129039 -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.yxxinglin.xzid129039 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yxxinglin.xzid129039 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yxxinglin.xzid129039 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yxxinglin.xzid129039 -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.yxxinglin.xzid129039description ioc process Framework API call android.hardware.SensorManager.registerListener com.yxxinglin.xzid129039 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.yxxinglin.xzid129039description ioc process Framework service call android.app.IActivityManager.registerReceiver com.yxxinglin.xzid129039 -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.yxxinglin.xzid1290391⤵
- Checks if the Android device is rooted.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.yxxinglin.xzid129039/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzE4MTc4Mjk2OTI1Filesize
1KB
MD58de25b28b4e023ebdd42b7f270e107d6
SHA1e67f440c90a94c61b65833529bb8d69ca26072a8
SHA256f20f1fa9b639e54a05377f1605b5d155be339d6e93a6b06bebe307f8fe1debef
SHA5129a25cb9be94a2fbffe2c3a8f79b24e2d3ff052ab82043afd6dd61a4928538c1f9ec0b3e53fbd78d9ad80cebce36dd5e1effd19d7adb4d02d90dac23bd9f5c07e
-
/data/data/com.yxxinglin.xzid129039/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzE4MTc4MzI3MTMzFilesize
1KB
MD58a83450066960c2312265e6bd57c7325
SHA18de0741d09b77af092a0e05360dc5bd687ca6478
SHA25686f9f07f0f3b387651190b77f9256eeb267f61dfd6439415034cd416d1830470
SHA51228e3ef21f1a66685588de7d7b98e594d65f513fa9af7325789fceaaccee6b02ff3d21d4875945f927b299e100c2e6e974e4d107540dc4b489f7ab83a48135b5f
-
/data/data/com.yxxinglin.xzid129039/files/umeng_it.cacheFilesize
350B
MD5ced7dac096653c637cd92b7485248b92
SHA1adc2fef2c7eb29759341783518ed7301bf10529a
SHA2564ac5a75ebe2d61f396eb1566a1fff950e49f3eea5b3c14352c89252f919803bd
SHA5123a4b5ed495406fd09a125a53a417ae180225709e1e50ffe7833cb093e552d31d516f34ce41c53b93d89bf0b33619f1a8acd82bd39c00d5638a3a48502920a29f