Analysis
-
max time kernel
5s -
max time network
139s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
12-06-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
a0dae5ce261f7d7a971f09c21aec67c2_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a0dae5ce261f7d7a971f09c21aec67c2_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
alipay_msp.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
a0dae5ce261f7d7a971f09c21aec67c2_JaffaCakes118.apk
-
Size
14.3MB
-
MD5
a0dae5ce261f7d7a971f09c21aec67c2
-
SHA1
24d24aae66078071ff599e4756f6b1aa73bb5ca7
-
SHA256
d5715b46879d9aa0aa344e21a94bb906fe16a80ab38e667595cfb17df5ce087b
-
SHA512
06d085c5e2ea6e5c03ce3f52db6d5be422f837ec0d2c6f8f6c994e37209abbff203ecc9b6719691b54ed0be66d017d5ae4821db2c6ef3ea5b9e242c662a4ff5d
-
SSDEEP
393216:usNp0vjBu1kqeNhQtw4fopWnoh7btGfs+OalHPHG7+nppCI:u9Nu180Vfu8ohH0dOGPHfnpAI
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.xiaoao.car3d4description ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xiaoao.car3d4 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.xiaoao.car3d4description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xiaoao.car3d4 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.xiaoao.car3d4description ioc process File opened for read /proc/cpuinfo com.xiaoao.car3d4 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.xiaoao.car3d4description ioc process File opened for read /proc/meminfo com.xiaoao.car3d4
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD552df33d6502d7a51d64b97dcf2a81116
SHA1b315d3f065eeb73cca1a14cfba7e7c76cc79d283
SHA2560a5e91fc3739bd0278c7f0335269e33da607784edcfb7420c13490c3b26fa965
SHA5129be7061f8c1a8fd468e8347fb0d0f5d0c7c815713394d04a63edf6ca838d3873f78e470e046286ff876ae07266230f899134a3a4f194c9009fff70bf9ffd574e
-
Filesize
777KB
MD596e8cf55f5589df0e75c40249f2a82f6
SHA1a44e7934415020d3726ec102efcc73463f1c3b88
SHA2561227be62150a8fd79a7b9587368b2d1f42edf5c618c75417c5f46a36398c0cc2
SHA51289a0b9ffe4c9f9337d401c1335e5739dc7f3aa2efe230b90c9c75d3f7910ba666b8f938c38afb1c366d6869bc1136407f26606da58ea2e7723027b12874d3b10
-
Filesize
32B
MD5de73519adee1273b799833f85f68e1ce
SHA166ebcb809f9ca594180ea4560d560fb7dfa44117
SHA256374a33442689ebfabb01ca3e54b2e346b5c58190c54e7de6e822d0fe1e917bad
SHA512dd41bea147b2f6b98c40b99fcf220b18ec7251932780f935d203ee6b985c96ecdc8cd5e40c4d51c8525adc4362781ad9e350932500cf6b59afc54f60826dcbcd