Analysis
-
max time kernel
173s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
a48ecc3e114500d1431e46a6ced8bdad_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a48ecc3e114500d1431e46a6ced8bdad_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
a48ecc3e114500d1431e46a6ced8bdad_JaffaCakes118.apk
-
Size
16.7MB
-
MD5
a48ecc3e114500d1431e46a6ced8bdad
-
SHA1
17f3c0d22e79ac005dc191f53dd14b7f9bcf719e
-
SHA256
331cbe6da7b22814686c7ada05610fd037ac81ab6e9327df7b86a69fd8019497
-
SHA512
881c1ab6f5e786f17a86b5f36ea427bf9abb61bd97be090ae8605728dd2c5a5cdf35fdc1704b03f4c1d437833527d1956be0f41171c171bdc641a6134f2cec48
-
SSDEEP
393216:RjIxaDCZEBoLxkNPmvcWo4Foyu2tlcBku1awFgfvI:RMxaDqCP6cWoyDul6Y
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 11 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.xgbuy.xg/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=&com.xgbuy.xg:pushcoreioc pid process /data/data/com.xgbuy.xg/.jiagu/classes.dex 4275 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dex 4275 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dex 4275 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4275 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4345 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4275 com.xgbuy.xg /data/data/com.xgbuy.xg/.jiagu/classes.dex 4394 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dex 4394 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dex 4394 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4394 com.xgbuy.xg:pushcore /data/data/com.xgbuy.xg/.jiagu/tmp.dex 4394 com.xgbuy.xg:pushcore -
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xgbuy.xg Framework service call android.app.IActivityManager.getRunningAppProcesses com.xgbuy.xg:pushcore -
Queries information about active data network 1 TTPs 2 IoCs
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xgbuy.xg Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xgbuy.xg:pushcore -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.xgbuy.xgdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xgbuy.xg -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
Processes:
com.xgbuy.xgcom.xgbuy.xg:pushcoredescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.xgbuy.xg Framework service call android.app.IActivityManager.registerReceiver com.xgbuy.xg:pushcore -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.xgbuy.xg:pushcoredescription ioc process Framework API call javax.crypto.Cipher.doFinal com.xgbuy.xg:pushcore
Processes
-
com.xgbuy.xg1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
-
chmod 755 /data/data/com.xgbuy.xg/.jiagu/libjiagu.so2⤵
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.xgbuy.xg/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.xgbuy.xg/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
-
com.xgbuy.xg:pushcore1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
-
cat /sys/class/net/wlan0/address2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.xgbuy.xg/.jiagu/classes.dexFilesize
8.1MB
MD57a721ae9582f8c3dd4d25e2f850bb3f1
SHA1603b497c3a6810192ffeb78ae9f8134bc5686702
SHA2565333d3967ddd5ac789b4544ffcd80d2661202c01c04f01d9319813cfb0ceee50
SHA5121c2d397e59956c96d41478473447d9f846c8eb6ef2a585322f98adc6cc4f3273605fc5728f608e8140bbe19c4c3f83201c09c51e85c90f7f6ac428f7f76d6ff6
-
/data/data/com.xgbuy.xg/.jiagu/classes.dexFilesize
6.5MB
MD58294f2f81db54ee61aacbd082fd565ce
SHA10c726749fb05c8f687bb5274e097e0d33f4e3394
SHA256f7e28f4705fcca718a9d973763928039e8f7df1bac4088d8b08cf356d366c115
SHA512d3c45de73a5b8ce733dc29f1c390b7a14678079d67e94f4915b25f65bf538b206df3ccf5cfacbe4d0e011aa06a6dc0159fad407ca16af87b2bace230c54c754e
-
/data/data/com.xgbuy.xg/.jiagu/classes.dex!classes2.dexFilesize
6.6MB
MD55321485d5bc4b58bced4df4646e66c6f
SHA1aed5f5694b4d1bddbebd77bff43e5c75f8b4f555
SHA25644276d7e3c28fe84fe0de44f11124016846d0620be4be1ca82ebf835c6cce139
SHA51229f57b81af94feca855d8af4191714e053de9f0f974246b32cf4856c88596fed0f7a31f47eb0fd2d48dd35f0f0f65eb6b9e596d2029f791346d923853469b2c7
-
/data/data/com.xgbuy.xg/.jiagu/classes.dex!classes3.dexFilesize
1.9MB
MD5c89a7bb0027122b831fcc546fe65183d
SHA17b0e11c1141539623648a051b6de07f3152045c9
SHA256f6672688f527dc0e45ddfb3137055fe21029ac3124c50686c95913f8daf58f54
SHA5121cf1bec0ab53d44c177f51e081caff59bd1a9e1fb4e020295a6d5d6a5c76e222b9ffaebf707be70ef328aa1d0ddc2e3ef87eb52ae68e88eb94f40116c3757166
-
/data/data/com.xgbuy.xg/.jiagu/libjiagu.soFilesize
446KB
MD58f55d5deb281d8aa1a0b9f72f7185e58
SHA15ce262af6a74a11931bf4b1e92a59b9acab27f37
SHA256b57aa883bd4a8241fe2ebbeec0988614da1ad453f5784f3439335a6f800c7944
SHA5124d74f007dc4a19ac3a8ae3434f06d2509397301c0a9b0288475280801c8907ce48248459436416fb14fc5a3a6ce790d680b6b9c95d35afc49c2f0639199b56f6
-
/data/data/com.xgbuy.xg/.jiagu/tmp.dexFilesize
284B
MD5f1771b68f5f9b168b79ff59ae2daabe4
SHA10df6a835559f5c99670214a12700e7d8c28e5a42
SHA2569f8898ce35a47aeafced99ea0d17c33e73037bb2307c7688e50819966f4ae939
SHA512dae27d19727b89bec49398503baa6801640540355688dfabbe689c97545295c2c2d9b0f0dcd7cbc4cfbf701d0c0c3289e647a152f49ff242d1ecc741efe4145d
-
/data/data/com.xgbuy.xg/databases/ThrowalbeLog.db-journalFilesize
512B
MD5844d1a28997ac1c37e361b6147735363
SHA1d76e501f6ace3b762d057d33cf2a4fd842d9702d
SHA25634acc94b9bb22868ef9ae8d5287f5c29bf2239d5b18f72327c6a07ba39141980
SHA512a152ae2bd5496642ba071d9e049c4d956938bf1ddde6abbd9bdbc5a30bd8158a4e8b39b9d7bbe0f40b0ff736a8f9ecd48e496c8cca4e8746822ec7261cb026ce
-
/data/data/com.xgbuy.xg/databases/ThrowalbeLog.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.xgbuy.xg/databases/ThrowalbeLog.db-walFilesize
112KB
MD58ca7c0bf108f1cb7ac9d4ba70f17c646
SHA1482be9402aba494ec98b7ab9655686b5c1787479
SHA25632f570564741f2311507f7cf3fe6211669da115960aacf30d97815c1f50a8e6c
SHA512ec7a57e509cda83da6000e4b370a01188766b80d80d282f5c99618d98340dd66a19a553ba84e520b7c06f8b1abd3ff598bd4f71aa5211e39c4402ef17f0cc19f
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.diFilesize
340B
MD58c9c7683ff7a9a15423704ea2c4c8994
SHA1d135d33a85e8bc81ea02ad4df6d782dcf74184d0
SHA256eb7778665aa6ee408bfd143389e2232b8e453c314dbdad097960ca9bcbdf9f45
SHA512953e2a3a5d7aaa27256ca4fec68289edf5c42ae248b84e810dfd16cc2b3deffd7c4fb38c6eec46d8e8683da80b57f2dd65ba5c3f8874550b61ab70d0d3a7ca20
-
/data/data/com.xgbuy.xg/files/.jglogs/.jg.riFilesize
314B
MD5bf64435267f283664866d9487e150967
SHA19d3dacc98a4f96a52dcc2629d410f712767cd9c1
SHA25656a696e4aa76b2c6cd10416b579eabf36416f2fb00571b45312cbd2099e4e465
SHA512b32a26b38646cdb1b881376906f09ef7e26a6c0036322c968d311a6d348dd976d381fe6c8309826adcdfbfdf385809d17347fef342e38217e3b180dbfb915e3f
-
/data/data/com.xgbuy.xg/files/.jiagu.lockFilesize
27B
MD5e19bfab1acb409b8ef16fc4fc936d8af
SHA16a7910e1039a3dfd775eb42d373efbf4b0f6973c
SHA2568981476255ef57722c858cc67f44c141b3283b84e1e4f07913caeaed9f8aac5e
SHA512e35567fbccb6c38b19dd2c6c2792bca86e48864966c521ebfbf9e11376627d02aaa7196901a9501d4b3345369426aeef28001d2927e2af7daa6bfefdf077e2d5
-
/data/data/com.xgbuy.xg/files/Mob/mob_commons_1Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
/data/data/com.xgbuy.xg/files/Mob/share_sdk_1Filesize
23B
MD58e24e79baab91c4d0604eaa9006a0cb3
SHA1e427afc94a4b957a7096f73e395a10ea404c076b
SHA25665ee797326cb9d94a4c8b13fb114a7273d80af9ae547496bf56556c479f75e4d
SHA51245bde5e1b5da5e54f7f5baf24cf4d9158ccf5813f0babc05677437bfedf1d54c4707090a1c425089e8f9582a85fed80b25c1e1f30ec2051afc6fe68bb8a76bae
-
/storage/emulated/0/360/.deviceIdFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/storage/emulated/0/360/.iddataFilesize
32B
MD5b0f92190d0288550093ff4222e616ef4
SHA1135695d21898345cd27a2be5212e46a019492a37
SHA25649b24a748aa4dcf023a6ff9ad3a31349437094efafe7f8cc6b16f8041523f774
SHA5127cf5a8e2047b11ab94fc88f77034ae605fd7bfde2b592f3a24425d5687d0493e00be854f28d72f0ef0d993e0f0fbe16fc4bd3354ed76be9fb01f1af27c1e2933
-
/storage/emulated/0/Mob/comm/.diFilesize
57B
MD5acc2a2f5cb76c41d2e97e0d409b53bdd
SHA1ed06f22ff10e0912f50d53bc775ed2ae70f85d5a
SHA25612ee2ab25175281fd1efab755eb5a5b442e91d263646c52118e6b1e97856f448
SHA512faed72411dfb1546a82a302b6aadf921bf66a09aa4641a6d1d523e5b58c063d5210089ca2d7dec8aadbe1efec4748a8abb36ab9fe1ab18539a92b76730b85419
-
/storage/emulated/0/Mob/comm/.diFilesize
57B
MD570a42cba408700f9a6c01c7941a8829e
SHA1eab01cc2c0671538795fb0b1146017dc099d0984
SHA256499576707ce2623293166979e59c832be5b8636c64ad39aa63ebcf961910c35f
SHA5128900d4dc8eed0430babbacb72942401bd22ef7fe5430cad90d3ce0c2c53010220d666aa0e2eb1026f3ec81d574c7fa12585b49222a5f15b01637f6ba134fe70c