Analysis
-
max time kernel
7s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
14-06-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
a944d3882fe56fc3ac31532e591cb82c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a944d3882fe56fc3ac31532e591cb82c_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a944d3882fe56fc3ac31532e591cb82c_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a944d3882fe56fc3ac31532e591cb82c_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
a944d3882fe56fc3ac31532e591cb82c
-
SHA1
f3a60e71eb244cc523ea12fbfbc7062cf4274600
-
SHA256
c8dd8960485f03c3b7b77246425d79c1e2bd9d813237925cadd22a6f08a35d1c
-
SHA512
e23a26da039d8910117c37cc2e8b23168ad08a67d79dad3a9f88ea016ff4336be8b06a5cd5c6dc289990d82d97efa420a8b439cba68910b12f263407f40c3584
-
SSDEEP
49152:OPb5zcXpsGYXHYeORuA7mQFywQW8EZVhSKHbKBKLi3uYH5hrfhjDcIyICA3w:uG5sGYXHTSv7zxIEbrHZL8H5V58jNGw
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.huawei.dsm.filemanagerdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.huawei.dsm.filemanager -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.huawei.dsm.filemanagerdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.huawei.dsm.filemanager -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.huawei.dsm.filemanagerdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.huawei.dsm.filemanager
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/AicoFileManager/source/monitor.xmlFilesize
338B
MD5d0cf9497c4542297f84448b15215f751
SHA148ee8833d20afe6a741e85c640f9700329aca660
SHA2567576aeebd15fe7c35cf4c75bc73f93121a8e6214f4e0de3762514545fdede852
SHA5127611fdd872a44e24d227d19fa797440c56918fda0016f0270e4eb748daef00e3cacf9472968b67810d2736ecf23de4d152eb6fe6217a59cf63bb62a21738f2a5
-
/storage/emulated/0/FileDSM/FileManagerApkList.xmlFilesize
5KB
MD547d654f2b9111186a202b62c68ee5adc
SHA134ffb5bad200d7df9dc30912cf0ef59aeb9f9ef3
SHA256adce29822878b4142ac00f0af740a619020cd9dee12d9dd003a3806d19854f0b
SHA512c6076987eaa3326647dd17a7329e4a99bc02728bae1a3e561295d1b38d5ee8e5146b3d0d90d2ddf545d36a7ac1da502befb9f5d4d6b4e6294ab94a430c05786d