Analysis
-
max time kernel
150s -
max time network
174s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
16-06-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
b54350d9ff187c0c59a3dd45cbf1c39b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b54350d9ff187c0c59a3dd45cbf1c39b_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
b54350d9ff187c0c59a3dd45cbf1c39b_JaffaCakes118.apk
-
Size
27.3MB
-
MD5
b54350d9ff187c0c59a3dd45cbf1c39b
-
SHA1
7a69a78789a7250f17c4b39b61e907ef10f90800
-
SHA256
520adf9d85c6254d911e97a2cd0394afa7d9f4624a5942d796c9ee8779270923
-
SHA512
2f5314302c37bfce55ab91f4e7d9a49e46ab5cb8023c86a592810e77de9b0b64202ee89017a282e55e6274a6d736a81a2c4a0246b6d19aaf106691e2c0f9e85e
-
SSDEEP
786432:fgTHtwfJTupFFyRGKIjI9cO81Bq1MI+eXjt:fgTNOTbG5nlw17vZ
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/app/Superuser.apk com.thesmartmelon.StarDefense /sbin/su /system/bin/sh -c type su -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.thesmartmelon.StarDefense -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.thesmartmelon.StarDefense -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.thesmartmelon.StarDefense -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.thesmartmelon.StarDefense -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.thesmartmelon.StarDefense -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.thesmartmelon.StarDefense
Processes
-
com.thesmartmelon.StarDefense1⤵
- Checks if the Android device is rooted.
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4269 -
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4462
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246B
MD5d36ab9da64a164560d24f045730304d5
SHA164e2c32eb56cfaf64dce8c561d31a5abe508baf2
SHA256e71dbbf2159f3e466bac2dfbf06d57233ea8b203fb885f839f9985f5188861ea
SHA5121a58aab5343c44ddff1ac9bd58231f24a0601db6834d2f0ffe87a1683251da4313efaeeb76facebb7612b4a26b5029034c723823b8ffa9fef51d7da9b2f4b637
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
88KB
MD5ba8bc47c9a97881bf3451f4c51955c4f
SHA1536e22000d866bbd4a32f058b3689e51a5722ed9
SHA256a5766611f0766fabb93177283f2ff90cd8890247170946a4baa6a9217998e008
SHA512b0559cc73e1bc9a970cbebcd09e2267e5838825a0d08ba8e8fe027a2c93dc7cb3d31cbb048dff317f76eaf4b8ba22dc57150153265de6221e04539f0083b80d5
-
Filesize
512B
MD5b99e41bc2be8567aaa3ea7d5b99279a7
SHA1da355fd4d672133c21fcac32334047c3615d26db
SHA256571620399779667df78696251a04fd1d2c072b13c934259a75d0a7e93d171675
SHA5127603fdc77851e3742ef79eec5b9cb2af4dd76f53d35a0898fe7cd7c9f1a6aac48a4bbc90677f3e53aa30babae4b49c314c786e07561353c9c46428a58df69589
-
Filesize
422KB
MD5c7176b36728f0d075e5049e3b8bb918e
SHA15fd8a32bca12de24fc5299d9eb9afaa549dc5b60
SHA25642ead67b5b33c06bbb8f6a9c68d69bfccddbb5385feb35519a399a8d5000fed7
SHA512d2b3ce50f3d8471605620c489ace619cb25d0c8ad7ac9b10ea0853212c3a636b1573e0cf8fc930047834745c2da24cd6cce9a0c24fe874405da0c31d06176436
-
Filesize
512B
MD5882ab59555cc2ac783dd652ff97cae89
SHA11dfbc333edc87bcdb584ec03412a38537eca1076
SHA25614dbf391cc917f9cf06960c2fb94cedd0ab3e53931cbf4237a5c9d86e5cd03ba
SHA512dbd481a967173038bbcd5dd7abd03f55f2b17de6536f5032223f7771fd3283496cc8ebe7f2203fe56b562bfbd52b11cbd3f13e17f87871bc6172b112c64edda3
-
Filesize
36KB
MD5b9346fbb47fd1b37baab063520fc629c
SHA1e2583625f9ee9c9ecdae10369adfda0512dbb506
SHA256729e2ccb47bd08149b1c00854e59018cd1fb57b36cf150f542a7df3495da52d8
SHA5126163e9b64d2d9728549fdec6722848e0149df14c8aa113edb15eea26e768b3754a562feaffcdbd0cb13c0812eb5bfd7d1f6702eb682f05c5e43233d044b16240
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e88b537f0c48552bf20f88357ea1c5eb
SHA1b10f80582e89ddb39564200da366fd04d045a1a7
SHA2566b9fe44c6fbb802e99e26836ce2f31ae238c2d572cdd7292606180cac3a91c27
SHA5123aa3385c5fcbbb2b24d8194e13fe206f7bf60410b3bd91219f0c6c9bdf2789516400e3e5527dc6ca283855af56e13c7efaf6b1e82695cbc96248cb1cf913be2c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
52KB
MD57f3f719d4f1de804db2f3d9fb3a3e470
SHA1867eb811ca7c370ab80db7709d2bae8c9d063397
SHA2566ea47129be4b114a496af4882f497db0ec2fae7af1e2409497a10438433502c7
SHA5125ed58c81d654977858b15343fd027c89dd0809773876d6cfd6298f735c1468758ea2a2b414471fab7ee5aa9b75ca13cf74fc57b34513afed74b77537c248326d
-
/storage/emulated/0/Android/data/com.thesmartmelon.StarDefense/files/Unity/13af0e9f-3fe3-4c87-becc-a208a0659d1b/Analytics/values
Filesize132B
MD5f4fc584463db18d2f51a352d427604f8
SHA15b89ac635522ac62012e8a55853904399988da7e
SHA256db0aad0aee5372043afaa8b758fd7cc28dd2e755bae748e238277f410861f6ad
SHA51202aaafc391d5cdaae7cc988794d9611007f3eed1bec268a8376fd91eec2b06681bc5e98cd028c48653e0fb7a36a495e80fb8ddeac7137005b92261fa139edb50
-
Filesize
104B
MD55294fec0d9806c58a90e1a1ddbe380d4
SHA12fd8ab4c2b1a655f59bc4ce633aff33c85ca497c
SHA2564ca267143399d45778e3350929379281b50bb4e1383e108b1c82545af487d34a
SHA51257372972355460f832dc01c990aa791342253b157727fc2392b71cedfe5d54d0704805a915cae061cae15b4e0d850d78e7dfce1505c8a9b3b43de53726899856