Analysis
-
max time kernel
21s -
max time network
186s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
14/06/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
aaf36256a481be164522d7d06baa6d12_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
aaf36256a481be164522d7d06baa6d12_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
aaf36256a481be164522d7d06baa6d12_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
aaf36256a481be164522d7d06baa6d12
-
SHA1
de9340f632db661eb79573985dffe4c825fe4ee4
-
SHA256
850a4d202c53c604b3f525f2197c9aafab067924528920a9235df9546114b91e
-
SHA512
2631efb91af6200cf341bd7f0b2ff5388a1f9ecdee3b0ad78ace6a161567d5d9cb7661934b0351a41c9fd316cbe9a54abe699e746134900f3651a7a063a20adf
-
SSDEEP
49152:t+hLbCobOVt7r5/W7GHWto+k7i9B5YEGu5+cP47E5WmIzhZ2oaBCTe:sbvbOv5/WiHMk7iz5YEz+cQ45WmI9ZJo
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mopote.traffic.surface -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 5 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mopote.traffic.surface -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mopote.traffic.surface -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mopote.traffic.surface -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mopote.traffic.surface -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mopote.traffic.surface
Processes
-
com.mopote.traffic.surface1⤵
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5027
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD528b01552a283a13aee94f278afc13be8
SHA11d4c52fc89b9285950d16b32823e65db0d6c18d1
SHA25642f47ebf2e078e5a075d0c84e0501aa15ef5f62d44ec05d0311668bfae52eb1c
SHA51215098724585f859dc344a353ee8fe92cac0c280414c691318a434d00cfc82195831a338edf21e318b15e2d256fefb073e0e32044eea8448ad9570f39785c139f
-
Filesize
512B
MD54d6042b740a34dcbbabb1bb6cdafc0f1
SHA1531e54fd77642cf4d8ef901ee7f41a106c83c43d
SHA2567a6f499dd894b6430064769333f6ba5b7c5520a14c6b665e3f37a9fe595c40a2
SHA51214cdb1f840165ac45afc76a6fe5363bf70a25c8a1f67655fb66b51fb8886505cdb9b018122cc3cf4639d0d10db475be3ec2730ae52821211a68580b45d613c07
-
Filesize
8KB
MD58056550d5d2970fba78067dbb97c6629
SHA1b931a09eb05a4a539980261164c0639fbe3b581d
SHA25611bd46943eb769aaff34ab94436ba3f9cc4df3d3ebe197f26bbbd82d5a9a4a73
SHA512082905d9889a204ac8d2d0f62b2127ef6bea2b1eb97754d7e67f8861e4de426b349f9311b3da59501e92bb288fa02093cf6833f9fd86f81dc482a6d73f21aedb
-
Filesize
8KB
MD54956177ba3c44ef5b316cf7acb3766b5
SHA14c0c4ad7b1fc9e7d5e25c979184f36b3d8bd6aca
SHA256bc0ca3248875e2749c47520ea2327b7badaeb0fe79c56768fd4e806ccc357af6
SHA512285b941f518a9c79d3d8f0e63f37c20c80bd82982acf5af4ebdb676f7b518b7ecb797ed18934f66a7a630db38c516cf0db989fe947403f5641b0deefdd4f8b97
-
Filesize
12KB
MD566ae4dd1ca473d371907621819fe3ecf
SHA1a41a253f6fb29144c6c266596ccd2a340f87b21c
SHA25603fae56e1db1bdbac1f27c1e589a37aa3d216e581bf15224acb3c9093110c4f8
SHA512b25ce1af65dc6bb85a1c8e4f8010ae8bb744d94294ca53ac678623c67390e92e1bc71825da2f0046a2a41542df44ebe6254ec97d1e64bcc3a881e17b3f739a1d
-
Filesize
12KB
MD5de543203968000f77ba56a62f8575fc5
SHA1b3b299c785c9cf63cacc13734d599104edc6a582
SHA256492e85b5243ad45856c71d1dd5076c936f7a00ac5d00800dc3c2690076eb3908
SHA512f91d4d2f93caa58ae01482d4afb6534fac3edaf7edf2c2d1b34124df82d4ea29e671377be6e95a3c38b8ac3a91cc263b96c5bec48df7c98e50e0752055571886
-
Filesize
148B
MD522d5b9556a486b3660aa998c842e4d5c
SHA12a8c7e0378d149a97af2315d8901308b8f99c4ea
SHA256c486e8b22d66e0727d2be5b7995e6d4209e47d0636ebd923b7407d47f3b01493
SHA51219f2cbe99128958dc7fa1ea139871addf6a5035780920d671732daadd24c8527186136270db963aef1e4f54a0df8b8cbd585662d434ec30ab0fa9a96f3b302f2