Analysis
-
max time kernel
154s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
23/07/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
-
Size
2.3MB
-
MD5
66bffe0de65f2bdf16a85ebe3153c261
-
SHA1
7e11e1a6c35218610a27b1a2a5e04258146fc0c9
-
SHA256
611034244742e3dd88bdfca6c43d8b40454509873e81bb25572265aac5f8699c
-
SHA512
86c98ef137cd10baa8b792ce4b939d3817b5c52947cea2155c627f2b065c11541962fd8ad40c222fd5b22470fd641032a87878b17790f68d722a913816df9730
-
SSDEEP
49152:DtkpnQ6qYqCo3+NzMFVI/ij1PSs43H3vf+Gg:1b+1O433HfPg
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/app/Superuser.apk com.yxxinglin.xzid665 -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.yxxinglin.xzid665 -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.yxxinglin.xzid665 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yxxinglin.xzid665 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yxxinglin.xzid665 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yxxinglin.xzid665 -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.yxxinglin.xzid665 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.yxxinglin.xzid665 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.yxxinglin.xzid665 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.yxxinglin.xzid665 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.yxxinglin.xzid665
Processes
-
com.yxxinglin.xzid6651⤵
- Checks if the Android device is rooted.
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4254 -
/system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq2⤵PID:4334
-
-
/system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_min_freq2⤵PID:4356
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD51f5771d25e1cd77ce0c8b2ac2d8486e2
SHA10c46ef749f4910bb401a4096d12f73900100b809
SHA2562f1af498e998931f3156eb073df3c7ffae74911727f404beb4472c7012780d7c
SHA512f6743f35f38af96dc89ae593ed7fceaf6f4fa9b8a8054b380a225fec9515bf870c9f6b9e1bc8135450e949d1f2a413e8299e8775e5e350333fc6d2bc1f79f8ea
-
Filesize
36KB
MD50adda9c85a5e4808f5b1b74c0a8591a5
SHA15048107883ab1e345af9cf2e6849ce46e0e612bf
SHA2561e17860bba2bb4e3e92df3890aa6dddc973d6602c71519a15556d37bb69de2a1
SHA512646061d3d5849772511bd94e36ca2d775a9a672851629d1812942ec0f0f925714eb7d4ebac44889911320cb6710a2f586014f6b1e126739cab653c4f8deef2d1
-
Filesize
512B
MD51852057ffc0078931e545ea401a4aee1
SHA11422c311ce8830106e95560df742b2bfbf613a57
SHA2562f822c2184dce380e28272b0892aa983797fdcf71987942b8fa4a5ec9ac5cc8e
SHA5121858bd47a0e16ceeb90be0cb2007d17f27af15ea69ef4787249705965f0124dcbe2c3d256625f1e9432dbc391f8c10b91057af0089aad80c5ef57ed707371a31
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
48KB
MD5c561c725b9ad3bf8874e1a8e30be3ecc
SHA18df11c0ac32d2af78516cb6ca4f6ee1a83ebb45a
SHA25641a0ca6ff7914f975d99ad6db76d6e4927767ac35ac404f3c943cadc849ccf55
SHA5129aaa7cba5a04f9f3707e71b422c074124aee0ee3fb5834e6a89caebcad5cd5d534bd164cc16c55a497579f8c867248657507710fd2293814d32161f353b5bc91
-
Filesize
12KB
MD51e4a1241bfbac41fdb71f30f1335d7d8
SHA1375e80892853e7043794f39563ff06c9259fc3c1
SHA256f0c8e6714e5c65dc6569fdc5dbf8310fb6c35e92f93da1a9788c7aae84bc817c
SHA512a5eb403f4cf93283e5a18446e4543decdfdc3610ea9975e501f7c2c8a931a72c395f7022eb0885e91ff032f43e92fad9cc126dbe215d977f37428b26c121c40b
-
Filesize
1KB
MD5b028948fe7c08665a957b84f3689df4d
SHA167289f4277dddfb21bba137e0e0f8a1bc22d410f
SHA256044fc25d3b8b90ac92103a40559a5ce24d4266e0c966f388a00e37cf89ebc9bb
SHA512ef7ed90fdfa8cdf62e56aade1ea1e8031ad8bfa09952a660656ffe415fd6bf4c92e601a0b4f1d125986bfbcb60f6533938c9347caf2aeac6ecb158b6f6157fd5
-
Filesize
2KB
MD59fb394d72bba1aa35b898b730e0e3112
SHA1bacfd064a74f15f47dccbf87f285ca2ac308a364
SHA25677bbe4be86cacda6c1a9344356bc2a48be9f7e8426e8c73891fa42cf66b1dcfb
SHA5124bec0dcdc2dc58ef336b1c1788204549757b5d030e12f627862a8a3a07d837fd5df621eadfe381f1976244c39172ae199613532c8a0692fa61b1dc92074d3857
-
Filesize
937B
MD5455d33e02fd915cefe43f33ba8fd9ab8
SHA1151c474e3e7532e8e829bdf9b060caaf202d78f7
SHA2560b8573951cbb096791cf0316d31b428d10eb6c4ae125b69f81e315e0751d1ad6
SHA512010f6e89fdc8765323f3d4df1d5a4eec8ccd27c3b372e6cc5ec615f048ee15f31aeb13a966e30d4242151c4a8d73bcfb5ed2a9323ea21b02e61f95b43365a663
-
Filesize
414B
MD5baeaaffd2f5e3d4ec8765b16b2b68081
SHA16b46625b9e86741b59b2a4633e18af17a956fcee
SHA2566bc4b932d135ef76a8e73bd1ad9d599fd328fb7ec2bd711e92aa61658443ea4d
SHA51216efa1a7e69867ed181864b2c64cd5858f40486d25e222a6a14bcead5740a6ff8cbaf15cec9e581a345120650f3c086c959ee669f288f17f6c38bae7cbd0c16d
-
Filesize
204B
MD58809da6137417af8d7b13a098cd824ad
SHA11fc61c393fc0c515ab1341d132f774dccc17d540
SHA25641bc0975d847acb311d4e60928a867cafb45bd8cf3370d5e3a01673f1640e1e4
SHA51226cc91aab91559ae1018dde2dc84912ba411471b8e0bf7b07c052fbac0c80e2592e33a79e09b7cb82ad33d1a92241da7bbf9ad61f53c0451afacebd69ed7f4f0
-
Filesize
162B
MD57eb82ee8996031faef4fa8eb06bab113
SHA179b6ed2123e3dd4c58311f20631b833969ddb53e
SHA256860572009dfe3c24d5878f4b12d00339edf9d4951d88468906ee45d284470d81
SHA51273b8e254adc758a850e649bfa47e733877ac591f2bc212894d67d1b150c69b5ecfe1e6127e1a8de8559cef9f6ccf8c014ce38f503305326625f50fb1150e48e9
-
Filesize
104B
MD50b11c5f20d75b7434106a2c70423cacf
SHA1ee15d92379ca31b6703448a0bdbfd8832fd7b2fa
SHA2569e7a5233fd7debc6bc1405b8405085a09e596994c40d9a7f513dc8075d208b80
SHA51266fd8a9372823890525c73776fae5d0eaa5acf3b8aeabe2ff6abfedb4e25a5b243e2a0c73dfa7befc9b0884b34d7bffd47eeb2a1dcda349b88830934c8e08e20
-
Filesize
62B
MD5dea092318ca7acce21a65ac85c9d2b11
SHA1fc24ec3a8fbcb48a2e9141ba61da0fda5ef6d398
SHA256425bf26238882f2523d92eaaf10e61134c6ab0f370bd688375765f6a23ecd946
SHA5128649bf0d9a7949d46190edea839c2ce17ca4db1b7babaa22310386cfe92db83b0885815b0a6b8fd01254d1ad58f098a0089e068e1f67123fd38a72f635e45d18
-
/data/data/com.yxxinglin.xzid665/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzIxNzIxNTk2OTc2
Filesize1KB
MD5e38e7fb018f46aa6fe2d1b518db18c31
SHA191dfe56f4da7977cc3bb820c9b2cf953f9edccbf
SHA256ef46103c3e8e6b7351e71861c84577a4d5f79724045caa3c03a2342ed7ecaeb4
SHA512d6745bf2d5040f855c41e55e92a639915f2f1ae131f61e01db9777bc492836e3ea0a1a5cb7d13ace2bf44f704d5a94361c16dd25963c8982d0e525db280f1dab
-
/data/data/com.yxxinglin.xzid665/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzIxNzIxNjI3NTYw
Filesize1KB
MD559a9a3efbc3ed4715491672b977f4d97
SHA160281732fab636b0d199da61b99346cc1890b531
SHA256d8b5d0dd9788c3fb47af9d4e6bdddff0567afb2aee4ab08c475e5a0abd9115b8
SHA51201812da57153a2c5d40d81322d45519d2feb057783a2b286719ddcde0d5eaae1a18e0a5dc6738ea8f673c669c06b1092b9e833f0b0603a44b6c521a128878c3b
-
Filesize
352B
MD5c12a72ce82a889799d6dc9436dcd5100
SHA154210f0604fb92834b5fec6d9412953cd1a50197
SHA25694a20acf598d48aa7983baaccc89c2ea78108d3371161566c51ee99cbfe6a591
SHA512a9912456dd6b1774d1f3e7d171e30da4b70056c8139a0248c75dcc9156b7361151d1374655c6787c2b0bac4733a3eaebc17a105a5babcb7d3b7f818f9386e95d
-
Filesize
179B
MD51ac0379c00683110e560005ab1689b24
SHA1632673675f0f9e97e33a6e1080a87ce9c7a05c08
SHA256f31a0685098d944a3843cc8c7cb8a3e847df52bb435cea3f53e20d2eef6295d3
SHA512c9e7c8a205dc33096092b5a11546ce37c4fe1237d5c070ecdb53e388b5fc21203b43d68dc0db2a68bb9bd3b2fab0a488e27ec56757684d1af1de8fde7237bd6e