Analysis
-
max time kernel
178s -
max time network
148s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
13-06-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
-
Size
2.0MB
-
MD5
a55b2ed02490254f92796a1b32607e10
-
SHA1
7972b440b28a93557cbc8d55f50bf88123f85f9e
-
SHA256
9b810cd2c0fd928830a3365c83bb51ebbb8755d8dcc01e331244bf47a7a81dea
-
SHA512
acb94411e50c545cd6b960596ddb3db49e3e3336a68c03621d2b34b2fac31cd81774270cd35e572d24a921e5cb2b162eabc275ea34782c12f6d5944ee4b6983a
-
SSDEEP
49152:rd2A7z0MPsWBTjOh8yAobZhfpu6YT7BV08Qd:rFz0M1jQ8UZynPBV0F
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.myappioc pid process /data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 5020 com.myapp /data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709!classes2.dex 5020 com.myapp -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.myappdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.myapp -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.myappdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.myapp
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709Filesize
2.1MB
MD5ec4d46c643c29ee1367bf791e701ada2
SHA1820d491b682ef5ea4634a73fef5987d00c276150
SHA256a1874afbe0441c906eaaebc03f9a7a647729c6e9e75a7cdb34bef7742438e0b4
SHA5124d351ab5365bbfcb01abebf9176d6ceb21f6cb56532412485d90524ea3f39207635bae8e4382bdd37959532b672ca249b2084529c8641109a6ff1c4f5a8f36a7
-
/data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709Filesize
408KB
MD56eef034d5ac3da6c619cddfb20df2e81
SHA11529d69d265f50717c1bf9ae7546b2a80831588a
SHA256930ec1fe7ff09ef6c66fda123e868d5e7989689fa17d1833e5a04716d296a6cc
SHA512ffe20e767be04cde31942228b939788edf0c0c89138b43703b983ffd05ad32350a762bc78410aa1e9e7a59cf0b3f05112001c1254e9ac0544cd9a4d9fe641d76
-
/data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709!classes2.dexFilesize
4.5MB
MD5f2bdd37bca225c125cb8cdf59e8b70d3
SHA18744919e45d714b2ba75ef286eb3f20795e4bb78
SHA2569cab997e28849d98c628e9fc572ca29036b166c77d3e935ee492d565a303f5ae
SHA51267fdc6a1466ed8953c5ed409a2b810904d8351a3279043bc48fd6cb5290ba77bb732af7cc854b73948c26241a25f7de6acd6c90a1554d18e01aa91667e089768
-
/storage/emulated/0/Google/google.idFilesize
36B
MD578526364c6e0921ab18631072ed01820
SHA12c111ba6821c7f0f2026011d01542966e6825989
SHA256d0d829c801d27d9a0581bda09f427c199c5ad1a291357ae44786f5f82fb57e40
SHA512bc6db9f277aaaef1d1b515c306b6bfbf5781b20692166627ce9d931329b630ef4b7fe7ed6fc5c9e92aaa7b834be4b3a36cd2674137aaceb18f492b296f86d48e