Analysis
-
max time kernel
178s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
16-06-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
b23ee7c3ca43a01810e36abdc048d3cd_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b23ee7c3ca43a01810e36abdc048d3cd_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
b23ee7c3ca43a01810e36abdc048d3cd_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
b23ee7c3ca43a01810e36abdc048d3cd
-
SHA1
4f48cfe6d8372b154f709171606c06281e4a4c13
-
SHA256
0c89f9870d0ebd8fae3c65af56cba370de78af9399a2b04122e7b2443440da98
-
SHA512
28930f63785760a1f1c1f76815b8cbb57470f81841f3944484716d9107ac758210d66b0d769b2d330f7bf540677ce26faf7fee779befca7d0ce9867ffe61b36e
-
SSDEEP
24576:6oL0otaYtXMZMPc7T61VaxP5PFA1rypq9o+P8j7+Zq/13tdHbZKm51Ob83t:hQ7YtDcX61icdysVUj7+Zq/1XHNKmjb9
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.eyyk.qwit.yomo/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&com.eyyk.qwit.yomocom.eyyk.qwit.yomo:daemonioc pid process /data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar 4302 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.eyyk.qwit.yomo/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar 4269 com.eyyk.qwit.yomo /data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar 4354 com.eyyk.qwit.yomo:daemon -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.eyyk.qwit.yomodescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.eyyk.qwit.yomo -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.eyyk.qwit.yomodescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.eyyk.qwit.yomo -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
Processes:
flow ioc 24 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.eyyk.qwit.yomodescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.eyyk.qwit.yomo -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.eyyk.qwit.yomodescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.eyyk.qwit.yomo -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.eyyk.qwit.yomodescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.eyyk.qwit.yomo -
Checks CPU information 2 TTPs 1 IoCs
Processes
-
com.eyyk.qwit.yomo1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.eyyk.qwit.yomo/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
-
com.eyyk.qwit.yomo:daemon1⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.eyyk.qwit.yomo/app_mjf/ddz.jarFilesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
/data/data/com.eyyk.qwit.yomo/app_mjf/oat/dz.jar.cur.profFilesize
304B
MD5e58aa47308fa6ce5c7a10c06b64bad47
SHA15cff29ebd1a5352ec4968bdab96fb33b2db8adbf
SHA256553d35c78f543897e54d4f8ab83b5c0ca159686849044d3ff497f1a4f7aa605e
SHA51229a787ab02e538be65368ef48b6f71ca8d62240444f1efa64a0fbedf5adbcc604d4003dfed67be99f5b5a694c43e4414e677b6aa9b279484b375329eed42124b
-
/data/data/com.eyyk.qwit.yomo/app_mjf/tdz.jarFilesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
/data/data/com.eyyk.qwit.yomo/databases/lezzdFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/com.eyyk.qwit.yomo/databases/lezzd-journalFilesize
512B
MD52a34a46ffd2d0bc74ea111496cd91cc8
SHA111243e75c22019f853458ccc2b15bd68496060ce
SHA256ba8a850f5f40524cc352c9694743a51a0d4ba24cf7341b8f545564707bbda3e3
SHA51206fce1e6eb16c25117bab7b4fccebcb26d9fe4c84a5ab52bf11b3f046fae5b3b424377f7704f96280199749a2f15eb4c43d5ee3050fa4ae494107b5a82d6aa91
-
/data/data/com.eyyk.qwit.yomo/databases/lezzd-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.eyyk.qwit.yomo/databases/lezzd-walFilesize
60KB
MD5f85633db4255d25017f4c8a6fb7227db
SHA12622225a6329a419ca531f29213490f31b83976c
SHA2563a8e050699a6211474bd9a9a7f6564b61fbaa132fd447b2614908e64eba920b1
SHA512a26e3e9e8fdb2f3e42caa2aa21fe2a355cd94e638a3902197668be86033a1ddab98e128db78a2d9d7c996e1fa85915dde23ef0c05083fede53e39843078a3d75
-
/data/data/com.eyyk.qwit.yomo/files/.imprintFilesize
1015B
MD50c56d668031aaf1a37ed8dab5bf95962
SHA10ccedc959a6cc2762a92364e5ba6b1df4619ae45
SHA25683e7f7b560325fc8aed75ea8acb019fada64fcaf4cb102528c6a5b2cc0bc240c
SHA5129eabb71c4a4665b56c87f9bcd01365914b1f3fb518699ec751b41192d13f96b134a3c063c8b2f32735387a66be3c12c61623da639df234071323aa7b9da8236b
-
/data/data/com.eyyk.qwit.yomo/files/.um/um_cache_1718521240445.envFilesize
677B
MD54441d6b7656aecea7d6443fb3b3ff9d8
SHA1761cbcc9eaae6a375e67e14f1d642710bee24a82
SHA2567b1021d692555a8b8af3853d0668393b081e2f4bdbce1a8ed1df0647dd2e1024
SHA5121bfdd2be1231b7d77a76d515245c059af436d5a47bb829b4a8bf90da3d6c078399928e7c82f4e278b5f23bae96ced896ce3d669797d82e098d1f3bea2807d72b
-
/data/data/com.eyyk.qwit.yomo/files/.umeng/exchangeIdentity.jsonFilesize
162B
MD54d19fed9bab2301594decae785e9d2c2
SHA1d603acb3c8a97d76b4aeea5e8e7911ecba247b08
SHA25623075d06e0e625926d6dcced782cca468e27c4362296def74d76026e3e9fb192
SHA5122b258e7701a1353a496d8d868ecb1ce26aaedb8be408427cf2ec580d4c2bc41f52303a8d118a08983dac0766af2ee7287d794ccfa589402b20251c8d704a1455
-
/data/data/com.eyyk.qwit.yomo/files/mobclick_agent_cached_com.eyyk.qwit.yomo1Filesize
1KB
MD544f8771d2016c2c35d5d6e88d680b5dc
SHA1df745ee1317a259066ca0b6a8d6a9b87c982f010
SHA2563a346159893dcc0001731832121f390c0375ee270964b2d07623015f7574afa8
SHA51292d183f72236a2991eac2330463e1fc5b36f67e14e345556eb6620e42b79d9656257cd02fad1c2d960dc78f0856a657aa00af7a9ecfd4454855df9cef65e6b12
-
/data/data/com.eyyk.qwit.yomo/files/umeng_it.cacheFilesize
415B
MD51f082410f904b5d910fd78b66b51190d
SHA1f38af951c23580f0dd76f6e711e2dd0882a24238
SHA2560737a60cde9b46ee193c9b9d73c62dbbaef28469770ed2c8b898a88f87fc80b5
SHA51276c08c8324bb42176f6e02869fcd8a226a9fa87379d8ab002a42b36c19ac608974e7ecb765ed389a16ff9a3998ebda387f8ce50f4ba3642e4fcff3dcf2417c98
-
/data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jarFilesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
/data/user/0/com.eyyk.qwit.yomo/app_mjf/dz.jarFilesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc