Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
17/06/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
b7e7d60901cc63f86c3cec1f7c1afdbe_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b7e7d60901cc63f86c3cec1f7c1afdbe_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
b7e7d60901cc63f86c3cec1f7c1afdbe_JaffaCakes118.apk
-
Size
2.3MB
-
MD5
b7e7d60901cc63f86c3cec1f7c1afdbe
-
SHA1
86294480d19189a09dd0a1bb22aaf5c0c043da2a
-
SHA256
dcfb80c992482e311be51eb59f37e2cd64c90050ff6e8ba3b7e35d2ac952210b
-
SHA512
5f2c56f6841b8b805cad175e619ca2152a9a546c57b493854576cf67f23b0daf2e1bcfe1af6ec9edbad29e3cd8c732cfa9590a474f6e50f2eb9430955729eb80
-
SSDEEP
49152:BuKLFsUTPxqzcAuZzAnB/doYiJiPKHuyucEGiNkvOccknQ:BrsUjxsGyerWKHloN0Q
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xunyou.xunyoubao -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 20 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xunyou.xunyoubao -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xunyou.xunyoubao -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xunyou.xunyoubao
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5287a5a1c5528889b37e63f34eef61516
SHA1f0690aa3edd3ed6017dbcee04b3475c2917866c8
SHA2562052f64e29fb61d613eddb36b8d8c45e2b16b8a09b97241d93e3128006a0d9f9
SHA512241ce138c7fcfbe997f8146e309869fa0f8ee8e06a3720a7187e2a12cdbdf1646b7ad85acaeddfafc01350de29034916a64f3dc8562eceff77a892736be42e3d
-
Filesize
512B
MD53bdcf13a32599c2cc9b8c1e872ab9933
SHA1e0a701c382252c375b23cf85e0ecec2c455c873b
SHA2563cd6fd177f98746d803b44fcc0ed14fd5f9232e018cee193486e3b64316b8d95
SHA512fddf966a4b5bc79e7bcc813bd98db601165bb3b036f769146b3ccbd8ca86ea5c4a55fa144a255eda41e0d002c5919616dd9329bcbfda7c9641ab070bcd5c7d80
-
Filesize
8KB
MD5e4c4deed6043bb23bd80a61ff708980b
SHA10bca925d5cf2d72452f39ab661a34adde35c6c3b
SHA256831c1eeb6c0aa611865d931329b855da8908d611a6ed6a3e248c3af2975b5f1a
SHA512c4f87f748fe788fdcfe1bdb60467f8693004c4fbf5f0cedc52343078329b90d4ea34ac7496bc261314cb87182d283ce2c3f98b29639e90fc32965a1f554ee849
-
Filesize
4KB
MD549b8397631b1c9e990bac595f8adb5b4
SHA1b32970dab6e30b1838a59411e0a410d7432d4827
SHA2562fbac03ab7b6c130f85b1f3acfed390f05a10c8a5762a7b2f1387dfdd6c2bfaa
SHA512c036bbdab6a74e6580ecd6694823f7db931f757a8563244617da263ed9f0ef48b869b9fb466083d94de629e9ab17ae4c6dacd4631fd175bf29e6b5a3afadb70b
-
Filesize
8KB
MD52264d8892d779bad7ca3fc56071d3145
SHA12cce543b0f0f3278cc7671d2370601e8583e7db6
SHA2564de4eda490366d923e482acaf137f6e14375bf17e5634f4ac1332bd65229216d
SHA512f76801f1835d6a7a905d72267dd7ddeb61e634d2da8b110102f7da7bb73be7aa2e250c463d8985f974a636392becae8af515d0bf24594f5a06029f56cb884256
-
Filesize
8KB
MD58fd97981e4c95796af3301fb4c8efebd
SHA153a96df94d5ab5d2c4c11fd9425c07d4f7471d23
SHA2569c667de3556c9a268ece907e1d7d57ed9559b8fa5c1f79a526c38485f6c670ca
SHA512355883f9cb815228f6da70b7b53e55a9901eb01d2743eed030a9c78689d5fcba7f2c275f9a5f1ee7471eaebd6626b9120f5d36a1d4c38d3a7649ce9787c46c35
-
Filesize
536B
MD511faabf46aba5cdf128986fbf55f93db
SHA139249add97f06e3a76b177d5b830500b845f03d5
SHA256351890e9af57d6a2f65643d75beacf2b9ee98b733f738c5bd258c05fac56cab0
SHA512527a2f6a46756565b4330ee521caadce3f8640df56dcce71c85dafcc2bdad0bb46bc288caa8787075b3614e9fd45cb130640cc588c933d2f63469dad84be56e3
-
Filesize
148B
MD51f0db72ffbb6d486b6f1dc7dded46c84
SHA1303025cd48b5ee4f4f90e992f3f73a2ae75e88ca
SHA256ce39312b7efad43ec6c44489887b26ff9200254b8a8cd4653fe8d34f764e1e6c
SHA5128023f3fa7a4e2617414e2304ab378a7788f10e436569d28a907ba8a7264f616516bdcf590b61ec77976436be3acb06b99fd8fe2ecdeac22ac11badc38e3a7d09