Analysis
-
max time kernel
179s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
a3974978d24fea1b0d9841c4744997b3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a3974978d24fea1b0d9841c4744997b3_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
General
-
Target
a3974978d24fea1b0d9841c4744997b3_JaffaCakes118.apk
-
Size
19.5MB
-
MD5
a3974978d24fea1b0d9841c4744997b3
-
SHA1
a2e0dae8d8a64768fc28f559e71aa7bc1b2bf89c
-
SHA256
46520ac104a09748c431dc9df444acda4c8fea165886061311799a9c7f07b74e
-
SHA512
c5f0de0653f86e5d07df0179cd8b19fe7a6510bcd88a551653d88887f4855e19c78bb42c75b4dab727ceb7ac6b0a15499b3bf56560e4f949a4d8f4a526057022
-
SSDEEP
393216:7jjNqeHH/k+kHXw1idNiGLE0cy+r2tF9Ymud3tS7gf/dgTRGF7z:7jjK+kH5uG4SF9C8c2TAJ
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 11 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.xgbuy.xg/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=&com.xgbuy.xg:pushcoreioc pid process /data/data/com.xgbuy.xg/.jiagu/classes.dex 4293 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dex 4293 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dex 4293 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4293 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4382 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4293 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex 4429 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dex 4429 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dex 4429 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4429 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4429 com.xgbuy.xg:pushcore -
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xgbuy.xg Framework service call android.app.IActivityManager.getRunningAppProcesses com.xgbuy.xg:pushcore -
Queries information about active data network 1 TTPs 2 IoCs
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xgbuy.xg Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xgbuy.xg:pushcore -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.xgbuy.xgdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xgbuy.xg -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
Processes:
com.xgbuy.xg:pushcorecom.xgbuy.xgdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.xgbuy.xg:pushcore Framework service call android.app.IActivityManager.registerReceiver com.xgbuy.xg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 2 IoCs
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework API call javax.crypto.Cipher.doFinal com.xgbuy.xg Framework API call javax.crypto.Cipher.doFinal com.xgbuy.xg:pushcore
Processes
-
com.xgbuy.xg1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
-
chmod 755 /data/data/com.xgbuy.xg/.jiagu/libjiagu.so2⤵
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
-
com.xgbuy.xg:pushcore1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
-
cat /sys/class/net/wlan0/address2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.xgbuy.xg/.jiagu/classes.dexFilesize
8.3MB
MD5a838fff4fdf89930be6dd388fbd80659
SHA114a327fb3b6029e6a4fbdf829615db18366337a0
SHA256bca7fbb222a7bd8cb5d067c98640e4503b08e25b319c2962404ff958560560b6
SHA51284b15c21ac4a0ce0511b4aed2b759303e5b9044eddd117684e2d1762c6bf537198ffb229bd964decd3ab40a4abfc0774e4557c9a96da290693d9f9c434ba0598
-
/data/data/com.xgbuy.xg/.jiagu/classes.dexFilesize
6.5MB
MD5aacdf68939a164cb8fb1f7aba60233ff
SHA1fdb0bd467ea9464193414daf0838c131bb494ce4
SHA256d3decdf9ddd937c07ff0f8e00331cf3af484723a2d10ddadc98cae19a814d81f
SHA5124deea43b8b2b8b234e9a05c4e41e8cd525b049ab549281e97310bca437e457409dd7028873f7745385aa7553f7e75c4f0a466079c7621f418f4806fb184e8ea4
-
/data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dexFilesize
6.5MB
MD54a44fc220c4e12fa64f6c957b7d541e7
SHA1965b965653d42a63069a07e3628452e97ba0a952
SHA256e63677f9eeca7225447f60398d4831f27b6bd5c666d908329d7cb03f260b76ef
SHA512c2a3aef3e712ba0f2d961bf281ca4f6b0e50cf1f5dc051ba4f2d93e6d06c825a2396bd1b5ce446ed081d357625a1b44cfb0f4a55d4624bad26047e721ce7410c
-
/data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dexFilesize
2.7MB
MD5415589b5e032e13b9871b2d615c3c87b
SHA120aa8c0f50fb4eea5330cd30c4a2851479994f8b
SHA2566aea01f6796ab45336d6763dc6bcad2dc452abd9e0d307b6b79cea6070209bf9
SHA5125f1c985cd2de55eeeb2f2ad742effeb6775d43d9ad812716b326035f5c8843c4c4cf08e1b131d5501ccbe2d9ab859a60ef406814f6c86f4cb57fc0c93858d4f6
-
/data/data/com.xgbuy.xg/.jiagu/libjiagu.soFilesize
455KB
MD5e5a53000766ebc433b27d6a66ec4f555
SHA12c8f53f1c03aec2005bcad67d731f07261dabde0
SHA25678e4ea857f10c2df6c7b94f0584524b52ecc099ed29478fe3964037b8a86ed2e
SHA512370a1cb93b14556ad861724f4e9995c9a4c6d37cf2d570f888d1c6000c66d27ac63496b0703361e9fc9bc7f309b7aa4407c5f339d186b0a5b72520d23d04b68d
-
/data/data/com.xgbuy.xg/.jiagu/tmp.dexFilesize
284B
MD5f1771b68f5f9b168b79ff59ae2daabe4
SHA10df6a835559f5c99670214a12700e7d8c28e5a42
SHA2569f8898ce35a47aeafced99ea0d17c33e73037bb2307c7688e50819966f4ae939
SHA512dae27d19727b89bec49398503baa6801640540355688dfabbe689c97545295c2c2d9b0f0dcd7cbc4cfbf701d0c0c3289e647a152f49ff242d1ecc741efe4145d
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.acFilesize
32B
MD51264f30db5bc978090c891fc9ba97820
SHA122a1664ca5bac8af36bdaf8e4098c02c7fc9c1fc
SHA2566383110e70c2cf20a67539bbf759d99229ac2dcd214cae6a3c5de840497bab2c
SHA512f3ec53223344ea4763479b39ae62a3dde4b83e0db05d4707c9e2c914725943063706c6c53e6fc043ee13640ac98242775c901b84ec76eb3edf11615bd0084488
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.diFilesize
340B
MD53a2a752388906eb7fc96383609afb19f
SHA119ec32a5a8fac54106eec99c9fa09c11e9f3dcae
SHA256c262b81f1145844df08e825bc7014e70d5de07dbafe89037e95fdbc02ca72e53
SHA512e02c16ecc3ffc3396f115e05f5e96ab295a49914ecf53f4fc73a41070326780b15011a3061fa4ca0d91d0fcd981a192be1360c6721883414a32d310f2820488c
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.icFilesize
32B
MD59afbf0dc0b4a4fd0a874cfec2c55461a
SHA1a42766499eef11be1120ff87588b7f715c1b2a7f
SHA25675c6a927b6cffe50b1a48e8aff766f5d543dec5aec8010b835ab4c4d8dd3da37
SHA512863cdc25dd26bc2db5a80480a5d5bd16965ce02afc94f732f31c24bdcd3daaae24d41504f0eefead9a8ecc402aa2e798ce100e8a225b13b38b05aa433456185d
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.riFilesize
314B
MD5e04901067f649e99c358d37ed5e43502
SHA1e510b44a5234902cc695e58c3de256493ce54683
SHA256dcb551a2d362e42a1c76ac067ab92cb8f485b28fdcf67fe87f45ebf92052914e
SHA512a788a532556e0e1bf7cf4bfb90976b88530e9856548341264f02f5d19533c08a40f2a5dcd5729bb1271c1feea90dd5018f8a634d47c5a7622d9388bc0b4794b0
-
/data/data/com.xgbuy.xg/files/.jiagu.lockFilesize
27B
MD54f2fb5ddccafc0cf74fbfbb0178ce769
SHA1de7335601c78ccf658489ab49d283a36be14f9b0
SHA2567ac70d23e175a7cbf1c8d22f14921944ea86761c31e67b6a275eb13c1b044ac0
SHA512b0d2ab772bcf2804425e4181d7f8502df140fdc88559e7bfacd6d7d6f19a582773e89619cf90bdc6c4e8be13fe04435d2b2e6d5272b57fcb7b9774d58a186336
-
/data/data/com.xgbuy.xg/files/Mob/mob_commons_1Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
/data/data/com.xgbuy.xg/files/Mob/share_sdk_1Filesize
23B
MD58e24e79baab91c4d0604eaa9006a0cb3
SHA1e427afc94a4b957a7096f73e395a10ea404c076b
SHA25665ee797326cb9d94a4c8b13fb114a7273d80af9ae547496bf56556c479f75e4d
SHA51245bde5e1b5da5e54f7f5baf24cf4d9158ccf5813f0babc05677437bfedf1d54c4707090a1c425089e8f9582a85fed80b25c1e1f30ec2051afc6fe68bb8a76bae
-
/data/data/com.xgbuy.xg/files/sobot_chat_log/sobot_chat_20240613_log.txtFilesize
201B
MD5711ab7f59fbda0984a63c27d8edecdee
SHA123e50edf653ec961a1e9037a0682ada55b3c4fb7
SHA256e44d7c09750c797661cbde6ba2b437bfecd67ee29e6f77ba56262075e7ad1b24
SHA512a257cbbf45df7305a10364d85a5ed336538638565413cf52c743741321e4516a7712afae4db3b3b0e4b484aa000be99e608f21b5a829ac55d609ebeab2e5c8cf
-
/storage/emulated/0/360/.deviceIdFilesize
32KB
MD51c56df0a0870ed1c3273c17e476a6f03
SHA1865db3b9119dd6dc82187d525c8b6be494484a99
SHA2567c6359bd9670bf186ea39c6e8f08f4120d033077a6167ce7d1e76f3dca6bca5c
SHA512f07447e0c243df2dcf050b93609f339a1d5cb61cd7a240b5bcc02a2bfd160a5783e1a69ada604c72ac6fded56a9607c4624f92794a052e9f2cabbf2c334cc246
-
/storage/emulated/0/360/.iddataFilesize
181KB
MD505ca8139924d0df7a71497dce10d363b
SHA13ea0a594d027cd814cc921ed53cf579333740f79
SHA2565316fa31377f36855f0e98d236678b6d9b2f8996a8b427f99afaf05eac683426
SHA51257e07c432a81f41138f62876a1ac1a8c65fedb6e148e6939eca12f2dd7476deb7e2f8cd7cf4ed4e7deef343ad1674e2cee7e793bd8a9b7ea4654568e4123a85e
-
/storage/emulated/0/Mob/.slwFilesize
66B
MD519402718bfb1c685a726b4e1d846ad98
SHA102a7e30044a67085f2f1da24e16e4ecfede65b72
SHA256079f790e6a1934a94542559f53a89a824aafd3173d956b6019291955aeeb33d0
SHA51225254318c22cfd301c8bcd479f45797d502b6ab5f14265dadfa3d87b4dd1942a629d3cbc2f0b600cf73b4fe910e3773432f56a0a7b4343e280e20c5a6af0320b
-
/storage/emulated/0/Mob/comm/.diFilesize
57B
MD5acc2a2f5cb76c41d2e97e0d409b53bdd
SHA1ed06f22ff10e0912f50d53bc775ed2ae70f85d5a
SHA25612ee2ab25175281fd1efab755eb5a5b442e91d263646c52118e6b1e97856f448
SHA512faed72411dfb1546a82a302b6aadf921bf66a09aa4641a6d1d523e5b58c063d5210089ca2d7dec8aadbe1efec4748a8abb36ab9fe1ab18539a92b76730b85419
-
/storage/emulated/0/Mob/comm/.diFilesize
57B
MD570a42cba408700f9a6c01c7941a8829e
SHA1eab01cc2c0671538795fb0b1146017dc099d0984
SHA256499576707ce2623293166979e59c832be5b8636c64ad39aa63ebcf961910c35f
SHA5128900d4dc8eed0430babbacb72942401bd22ef7fe5430cad90d3ce0c2c53010220d666aa0e2eb1026f3ec81d574c7fa12585b49222a5f15b01637f6ba134fe70c