Analysis
-
max time kernel
179s -
max time network
172s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
15-06-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
acd8c7b82e39a3eb699c913016d9db55_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
acd8c7b82e39a3eb699c913016d9db55_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
acd8c7b82e39a3eb699c913016d9db55_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
acd8c7b82e39a3eb699c913016d9db55_JaffaCakes118.apk
-
Size
3.7MB
-
MD5
acd8c7b82e39a3eb699c913016d9db55
-
SHA1
cfd4ed7e5005161d25dbc209390ce5a71304100f
-
SHA256
396d5ab7a7d6dcd8ec927573f64e9a06203bad68000c2f0560cd596faf7633ce
-
SHA512
e857ac10801f1c182d3973283d41fd17cf72a009f035d498d410493a41923b570fc5a2c476d0b94e17a7212b41d5e3c4f54441d8a4e0a4842afb4317fe6a0d94
-
SSDEEP
98304:IjyHjcvget82AOVGb1hiZgDepBtnzckMe9tf4HaVB+Qg:zWget82yb1hiZrpbYwtMaVB+
Malware Config
Signatures
-
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.eliujia.appdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.eliujia.app -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.eliujia.appdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.eliujia.app -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.eliujia.appdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.eliujia.app -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.eliujia.appdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.eliujia.app -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.eliujia.appdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.eliujia.app
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5171aedf968e17a2744d2585715606cb9
SHA1bbeddeb3b89fcf809619c35b4a318a80e7d5b029
SHA256d2ab452d9360848f46af866b870b5c6fc98230b09c72b89cb1a4b2778586678e
SHA51278a0f517ee3d21c153dda6dbfec4187ebaee9d520d7b1b63f358bcb125d08aea53f26943907a56fdeba40161d9fc7e4fd63f9ae3154dd2ad887ba0162738285b
-
Filesize
512B
MD56affb9c0fe5ff9ea934222d3b07ad648
SHA10cba3d60c1969ab9d713ffe04af28f2f13c5b71f
SHA25657632760a490ca0bd6398bee4411b43a07511fc22d1a7fada624e21415331a44
SHA512b7f01b984f8106eadd44ca2cded95a8a2988d32e4e3297c67cd2efd80b29a8e422301876356cf9d06c28c3896f088a103f13270e639508524d6f34ddef8d6909
-
Filesize
8KB
MD51d6416b46a2d492674bff8162fe8d22b
SHA1bb0438b4af39fd67d9946b5dcaefe0e3dbb51d14
SHA2569d29f8de093f997b2528f0c03d92b8e5b7a81dbaba06daf495e93413ba2610fb
SHA51291e280a6b5cab2e509e7b8e81f95752e6205dc3a798941802fea2c221a3d370542a750d4430f9fec3114438fd925debdceac2be1d40fcc3a84972c7c8b0f0dd1
-
Filesize
20KB
MD54fa65216d7c7a0d708f0fc39947bc574
SHA1df4d662c7336532c40ab966647bdfb2b74d8a0f0
SHA25690efb1b89a9732f3da0cbfc20437ceb7a03e6607cbdb3eed1ddb8521e28c50c0
SHA5129f38d1fb651f61a8b7c95460c0a6a55b7e0d60523c680f7f11d1fd8887078d6694ae5d68c2cd1207a86b8e7e8aeedf8117a6cea47d1fc38719be522be062063c
-
Filesize
512B
MD5b9d613d8d2e71a42892c54ec4c6b46f5
SHA1ab97018745ac70f91e417c2d8aa305b023a4328e
SHA25658dce92f7ce54d11aeea837628084e168db01dab519625a753ec2c36096543f7
SHA5126ed3c153addde2ecaf10200c8669061fff388799806f7e0423823834dac18f9bfa65d79b9e726c2c4491f43db7a7ee78becd01d33d54f05ec3e1f7cf4ac44caa
-
Filesize
8KB
MD5112afe585648b10b29ac6abebdabcb91
SHA1ead4b88a0e8468af1317ffbf49d0cbd79fd06834
SHA25671143883cf17a48ba2638556aab5a39f76a008d790a723ea0f8b50610a32179b
SHA5125980ef86f8f47feab44d5d8ca06702f9208e10be1ee3c76b59a0d95b2335d29eb7cbed60e03bdd1009090c17154b13c572b4ef76bd26733ee754e74858654786
-
Filesize
8KB
MD5e7bddcc6c79644134611e12afbaa78a9
SHA1bf645ec7741a000b69823303217916e67596c152
SHA256904bcfe67052887e4e2327adc59dba2c8d9c4b919568d8134129bdf9b925620f
SHA5123faaa0f031419f298bff6f998b37cb5dc0535b6e83a65f26c5bdf23edaef3ed3336054b733cf71a5c2cdc9bc213b934164bab67073d5e3f548212562a07eaa6d