Analysis
-
max time kernel
110s -
max time network
186s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
12-06-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
a027813482b259f8839d0d712a2b5aa8_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a027813482b259f8839d0d712a2b5aa8_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a027813482b259f8839d0d712a2b5aa8_JaffaCakes118.apk
-
Size
12.3MB
-
MD5
a027813482b259f8839d0d712a2b5aa8
-
SHA1
dc8e030e22eb9fc091f1ec294a717ada8647898e
-
SHA256
908174a824f24f671be6a634a49463c4193f5688a8c104fec9b444b262fe3feb
-
SHA512
be3e14476962548ef5244912f06184eb47f44e9a96f14b3be94a9e2195969eeb8084cedb54a404912a993b9aa8ba40dba7dff651a7e7ae3a2034ac06b0c3908d
-
SSDEEP
393216:dgG5SIlQ6oBjcvMBkBC4QBpMdT0slTKUTNuOn:GQSH6eqM0C3BmJ0GTKb0
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
com.sogou.androidtool/system/bin/sh -c type suioc process /sbin/su com.sogou.androidtool /system/app/Superuser.apk com.sogou.androidtool /sbin/su /system/bin/sh -c type su -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.sogou.androidtooldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sogou.androidtool -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.sogou.androidtooldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.sogou.androidtool -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.sogou.androidtooldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sogou.androidtool -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.sogou.androidtooldescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.sogou.androidtool -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.sogou.androidtooldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.sogou.androidtool -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.sogou.androidtooldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sogou.androidtool -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.sogou.androidtooldescription ioc process File opened for read /proc/cpuinfo com.sogou.androidtool -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.sogou.androidtooldescription ioc process File opened for read /proc/meminfo com.sogou.androidtool
Processes
-
com.sogou.androidtool1⤵
- Checks if the Android device is rooted.
- Queries information about running processes on the device
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4174 -
chmod 777 /data/user/0/com.sogou.androidtool/cache2⤵PID:4203
-
chmod 777 /data/user/0/com.sogou.androidtool/cache2⤵PID:4226
-
chmod 777 /data/user/0/com.sogou.androidtool/files2⤵PID:4280
-
chmod 777 /data/user/0/com.sogou.androidtool/cache2⤵PID:4317
-
/system/bin/sh -c getprop ro.board.platform2⤵PID:4345
-
getprop ro.board.platform2⤵PID:4345
-
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4370
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ee3364cd39fc8246ebcf6f2e8afca95a
SHA17fa4907c7573878a8f1c0954b7086bbd7571870b
SHA256573bfc00fa03d6c30cca08a9bcf875ea352a99d99840caa6ca1423620edb9963
SHA51290ad4d2007e34b567f62810da825561fb09a42861c6feab96a354b8d5cbf2b5718b74b8b8539fe195c508d46d08d6006c5d937dedf90cbfb94ecc564a0e6bb93
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
48KB
MD51e6b8498780e91503a370865dfd10e4e
SHA17583b7bd77b42a215c5737e91ed584f83a3da197
SHA2566001ce0de766a27ea32f0635ec5d145d49d9598e49e9fdf5ec396ad3b9071c0a
SHA512202b259160fd7d3dde4769d21bfc49804ae03b9ba64cfaa6fff7647efb8724e1ea6b3b79f2d7c91ee36731ab3c2c1184e5584d66a201997a0f8a1f08daa00737
-
Filesize
512B
MD5283424cd1426f48a46d6f5327e14b326
SHA1cc27275022a7264a557523d7f3fed5065fc818e9
SHA256af2881ef96fa23be8e3d2321479960f56cf1ad436b65ce023c2e6e9b68e806fa
SHA512764ae564197164c2b7cc66b903cd2f37729fe52c02cb9cb5473839cf6d48ce090bc836cb206209a89fb8ba0395707e141c781fb3df6907a5d28a8976549cfbc5
-
Filesize
68KB
MD58f9e5b93fda42716f81fdc61bbec8d82
SHA184f26635a549e2ea9ba2b8abf7bdef1d676d5720
SHA256cc10d5a9486ce083bc6d9de39957b033f592bc3f31fc3554202b0cef34f8feb3
SHA512136656c041de2edcdc138a630d64359198ee2e44c4c7386c46f6250be3d7a6b966bfe20a9cea40f8d4c1334b1940b213baa94e80b9fb032b9b6f88f703386efb
-
Filesize
512B
MD5441f124e5ec72494f29158eb6c7abc64
SHA1147621e579a3325968460b76bbec85477adfcbd5
SHA2567806576514b0e9524512b11e1af977a3a4b71f26ea132ad61013c3535465c8f5
SHA512e2047ea0713f5a0774f0fcc55af7d3b3542dc80706092e6fe5fe76daa33f763af9eea3a27c645fdb9c252c26a67e762267bc53134694dcb2040979ad1c7b0658
-
Filesize
48KB
MD556cb51576e65905bd6aebda8856d2470
SHA143f824ad121f17dff53acfae2a0bacaf1cf3b708
SHA256dfcdc2c946156b1a972cc1e5024662f76adcd9cb64831e80735aef7bf1021334
SHA5127b4a174ed1911004dfbee82e9852090518aa441df3b1e261d399078152f05613c11b4e41723955a0c22a9cc66e8f270e29e66d415c8ca2658d671916ae3ed6d5
-
Filesize
512B
MD529ae6643162361538fe5a880f9df6e6a
SHA13b083ddf313e781b299d5d5a41be19f1844964d7
SHA256c46f194b2993ed5d2a4ae35f7ab21c11ec1399c6b2762d786b0ca10953d4dc03
SHA51204eb572c8712371680c8e40b7438a9b9190368d8b70cd4578351834a89055c591ff0da0a11962b900e42bf139b72c109760cc7794544b9f6e0402c198f489db7
-
Filesize
52KB
MD5c9a0d98dc1884b25a44c4ed2a3334122
SHA1ace8a818591fbf56d99ef331c70a601fd386aa81
SHA25624900b9492db7b7c4f0855e2a551c6ca71fe2bad9f0de660fa49196d6011b949
SHA512852d57d2585b73505c50aae24ed676cf16bc6d85b8ad880a9fe8463c977d69b621b998a290f4a29883b989b207d96328971c099a7edc4252ee192679d5338849
-
Filesize
512B
MD5f4e0b53a586b6ceec35ef15c2e385375
SHA13d4e80b5bd95965d3d34fb9db03078a92ee3b0d6
SHA256436fa7ff0930b1f22075063632e9bc636052b41ea9321d727d32827987c06184
SHA512ad96e1a2d6bffd26a6743fd88df44c2776a27f8f052a1c884c27f8b461e8cbca348d03cc8cf5586abc5434b7849678cf516312a6287ede1b1ae08e7a96c7ca04
-
Filesize
100KB
MD597addbb19ffd1a9331f3475483cdf564
SHA16a316d887cf18e2306a4e811f68febd499726b54
SHA2561c6d6bcce94768ac664706bac2b5831f9518c10e575e448fe55e688515459a0f
SHA5123ca090ef88fe5f7a0268db6b8d32c6226fc5e78e1f57746b567896e30f07ef4b7518a5681a58601ee9f52e1a3d4bf945e7e62c6ea5305e9dec025e1ee4a9fbd1
-
Filesize
512B
MD5c6e962f7f01d1f976219a259ca22bb77
SHA15f7ccb879ec9d56eb14d279796324b38e97e243d
SHA2560152a2ce49155d8aea2169ce2200d0d5935eede045e781505c05277d91cf908a
SHA5121b449ba12f8dba3271ce89321b9a78e43e5df4b82454852f27bdc737f5da54203c021c7bc259f19a3a9e75bc8da8f9d26694aec175c033efe0537b63f26b48d4
-
Filesize
40KB
MD5cba99414dfc768e69941db44c800a625
SHA11f7c802a065765bfaaad9e226eab2666e7c27e4a
SHA2560db072ad675060d07faa08ffb1da9916aa8f4fc1a574fcdc7e71cb4903e98839
SHA51205ef460c064519d8d0c18d2aeea3490c3fb57bc547ee4c87436bc126b85f1355389f2b572284192b0bfcca9406337f3969d1b9961e7c65b731f855964b210ccb
-
Filesize
16KB
MD52e88d035f7dd4983dc71afeb8347bb23
SHA146210e953ca9e3ed1ce33d29981894502b7dcc03
SHA25688cfbfe4c21e2d1285c7ead94a47bb88aab9619f5d02c465b45a1d4265fbe5b4
SHA512ddba27e04a397de48c822968e0af157ad85b8e280f41d2afb903d405df1775efe787847738019b1cf466ee0a5b14c459838271dc2e3ecd710869b7a62fc93d3d
-
Filesize
512B
MD567a11049c2d2a0516cf2fcd4807e2c9e
SHA1ad541507fd7f28edef056a04a1a991d455e7721d
SHA256b142be9eb37c81a0f40971efda666b19790f9482c1a50698b6d4415be34978fc
SHA51298232f872493382db46735458e8e0525d885649c109e173b4289a6d9c8466331b75aceb7a0864010420e9d2eb99441183c280212b0583a8bc8b7d82059765429
-
Filesize
28KB
MD5a5b8b685cbf31e228a4252fa5a227e3b
SHA12d6f1c48f40fe7496a3175a5fb28c6eb84ce57a3
SHA25628b313970e5875da37f5c8055e62b75a2638f56da1402f04d96379b5db82e1ed
SHA512587b665bb0512926b8c71e9f2ff9e834fee39101a800ee8489d497226ec18043d622660e77c49f80b59c96d28022302be59ff685a7c13ea31f903d7deda83f40