Analysis
-
max time kernel
28s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
a4c0d7448e127bf6332ee12f32d5316c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ZqhySafePay.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral3
Sample
ZqhySafePay.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral4
Sample
ZqhySafePay.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a4c0d7448e127bf6332ee12f32d5316c_JaffaCakes118.apk
-
Size
3.3MB
-
MD5
a4c0d7448e127bf6332ee12f32d5316c
-
SHA1
63840b7b10b612ce4dfd67a279d04b5818fca7e5
-
SHA256
33596bf1ec339f5d22da8374fea5fcb615f7ed5b700219c051c096c06af422ae
-
SHA512
cb406752bce581ac162e11eb2d41a37423b799b877ff8394a5067fd185a0231235ac9852a76cdd4d9164c126b40eb573fba9e7258819ad2bca03273730a8e41b
-
SSDEEP
98304:ma2nAv8n3xivxhYrXwXnUTUAm0DNeWH4t:0Av8n3xQhYk3kHmG4t
Malware Config
Signatures
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.hpw.ty.jiuyaodescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.hpw.ty.jiuyao -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.hpw.ty.jiuyaodescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.hpw.ty.jiuyao -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.hpw.ty.jiuyaodescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hpw.ty.jiuyao -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.hpw.ty.jiuyaodescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.hpw.ty.jiuyao -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.hpw.ty.jiuyaodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.hpw.ty.jiuyao -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.hpw.ty.jiuyao1⤵
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.hpw.ty.jiuyao/app_crashrecord/1004Filesize
226B
MD5028cb80d69d8685c60ed51c759b7c520
SHA13c77fc08e66dbdd034f4ee005a862646ac4d2827
SHA2564a0b4550c2757d4ea3767d09271fd3ce01dd586d431590757d959657d39bf067
SHA512b92e78db4c2f85f536f7d93084fa79bb5d11aa06f0781a6adc8d0c79a0c9948f6e10ac897cdb987ddea9fceef2691a94d9d4cab6265e4a2c5afa5b51a2fa3c1b
-
/data/data/com.hpw.ty.jiuyao/app_crashrecord/1004Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
/data/data/com.hpw.ty.jiuyao/cache/ACache/-1330580981Filesize
6B
MD56a93194c9d78da0bdc4697864717f7f0
SHA1d2d0c0ed8c044c35c6499d594a3615aba90029c4
SHA256e96d92bf479741fce0e1fbfa8aec638320ec4c8ccce6a3e17bedf5b93335d0b3
SHA5122477502f94b02f254f7a1774e0857925ae1be0060f71cda04d52f2f8dcd5c750ad5e0807a79489f4661513f373f9445797d2e60a5a8d9f7ada049ad8dba6916d
-
/data/data/com.hpw.ty.jiuyao/databases/bugly_db_Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/com.hpw.ty.jiuyao/databases/bugly_db_-journalFilesize
512B
MD51778395ec001d6429a3faf7ec5478836
SHA1bf397c189c16e8c53e1774451e02532c5c440027
SHA256d3340627a26ab1cb431391e1b45f8dc26766fb7bda68c3a92ea17bc898da95bb
SHA512b8201379638b38704eb0d9a23eabde31080e8d8a13b6d28d5840db4c90b7845e778aee75aaeeafd4912b740ad3ee5f69e7b1444d2d81c11da303df541dc0defe
-
/data/data/com.hpw.ty.jiuyao/databases/bugly_db_-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.hpw.ty.jiuyao/databases/bugly_db_-walFilesize
72KB
MD5129c9a5ba44482c25e04fbb6f8802acc
SHA17d042dae928289f24087530292bce8765ae4e721
SHA256b41d77a75e9613b77b96ee7e91449ab1d49cd0bb4773c9fe6a18412f82236825
SHA5129b5eb5e5436447af9b9c9a28d4149380159ce1a0c58df1c641e216e49c5ccef6b5c496102c0ad4e81b6293abd0f694bec247318db990d7e7b0256d572a838b5f
-
/data/data/com.hpw.ty.jiuyao/databases/okhttputils_server.dbFilesize
24KB
MD52c25d43030ce6fe8847af2055173a32d
SHA160a4422c903bc5956406822e5469c5f825689972
SHA256aae7651d7e13e1b8181612cd55335938e2fbc11c89a3a81cace0e6c410d6eb1d
SHA5120c6d97d74743d506522e92548506cb9fa8bfae2a4d2f7801d4cffefa310e01506611a127afa3df2a2ab2c770191165f2aa7074ebd042ef9b7ceceef29dd017aa
-
/data/data/com.hpw.ty.jiuyao/databases/okhttputils_server.db-journalFilesize
512B
MD56003f38060f566bed65aba816f97ddc1
SHA1d5b2226495cbcc6b9c2064260b4fdb5b77c18860
SHA256e21607b9edd2e2db16c26fd786bb83b56285d7f7c89d1780f7e3081c13a33da7
SHA5122ef5b1b6bf903e9b9f7afe9689fc38af60eb14fd644b22a33308c8f480d8038cb0d3c39a3e143ea25a006ea616c41ba50ce8d0511cea1f30a39afbfa1df1d544
-
/data/data/com.hpw.ty.jiuyao/databases/okhttputils_server.db-walFilesize
36KB
MD5636e9ff702f5467e4569ac26f52aa9f5
SHA1e7482ceb707759ad2c63d0f6c0e3633adf4a766a
SHA256aeda91086f0d914255f8e2fbbf4b19eefdc742862ee53cdae2850819951c6e59
SHA5123ed0aff9f9ce3d485393352a415db55717a97484ae417e4c883625d60d3a7b613b9b300c1ef9ec82da645493194e1f1d00034c8709b90a6162c01020a2b9a5c2
-
/storage/emulated/0/UcQkDir/qk.dvid.txtFilesize
65B
MD5c977eff5f3febaaca93c47da0a170b61
SHA1b03b1d69282db85eca42359cb0adefecefff2890
SHA2562d93ebd9aef252b0ef35b38316081a73fe42ff5d218650c4c72fe7dd843b279d
SHA512854a985a21b01e5342e5f94b6d1bc93fd098ebab4edfc16e83f20222d6b141a8770b094306a4ca105e7954d3c153b7a05f7172ce99b0f638d193a5b4b9552c4b