Analysis
-
max time kernel
158s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
23/07/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
66bffe0de65f2bdf16a85ebe3153c261_JaffaCakes118.apk
-
Size
2.3MB
-
MD5
66bffe0de65f2bdf16a85ebe3153c261
-
SHA1
7e11e1a6c35218610a27b1a2a5e04258146fc0c9
-
SHA256
611034244742e3dd88bdfca6c43d8b40454509873e81bb25572265aac5f8699c
-
SHA512
86c98ef137cd10baa8b792ce4b939d3817b5c52947cea2155c627f2b065c11541962fd8ad40c222fd5b22470fd641032a87878b17790f68d722a913816df9730
-
SSDEEP
49152:DtkpnQ6qYqCo3+NzMFVI/ij1PSs43H3vf+Gg:1b+1O433HfPg
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su com.yxxinglin.xzid665 /system/xbin/su com.yxxinglin.xzid665 /system/app/Superuser.apk com.yxxinglin.xzid665 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.yxxinglin.xzid665 -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.yxxinglin.xzid665 -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.yxxinglin.xzid665 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yxxinglin.xzid665 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yxxinglin.xzid665 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yxxinglin.xzid665 -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.yxxinglin.xzid665 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.yxxinglin.xzid665 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.yxxinglin.xzid665 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.yxxinglin.xzid665 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.yxxinglin.xzid665
Processes
-
com.yxxinglin.xzid6651⤵
- Checks if the Android device is rooted.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4943
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD532487b6731018f98b6068ff35ff5c015
SHA18d3c99f14fe61941a04f8c1b85186eab2c6901c1
SHA256cd25c67d5d579f5c6e75bf756749c1550ab2abf70db301e3b9c63698a33ed646
SHA5124136f036e8583314771daa7379a2bd7e17212becc3b33305a7b3459acdc57cecccedf682d85c264daf17e21e31c45876f3a09ace9c3fac92930f001cd07aa23c
-
Filesize
36KB
MD5b7036131b84bdf2b66c67fde18d62308
SHA118b1e5a358d68c846495cab5cfef7c6679659093
SHA256c2c0bc8842203ccf1665dbb5b3333b22ae5a6ae3ef8eafe83e7f43adf32d0295
SHA512256bc83e1a516a58f5d1d024d27dad3c26723df0f96e0deca6baac86d84518000212570b06996a14bcbeadff05fed05125862aba2d4aa08c15a6999563dac067
-
Filesize
512B
MD5c4781dde81ffcfff961be3f9c2a96a87
SHA170ae33abfe6d699c16b1691aa8e59495e2ac885e
SHA2565870767a05cceb625258b24281368459b6c54a5c6d3d55054d0ba2af27e3b6aa
SHA51234af7a1c65142672cae8a630460078dbb48568b8815e6feaa39d13c8c8c98156e5946264fc2766150ebafca1f2894c52832f5d4793339e13922f536119097b65
-
Filesize
8KB
MD5835121b20f70ded9d7cde84cc33fc92b
SHA15f6e09d8da5fe106273786798f852cb42e92ceb7
SHA256be7204ae2cd7be8911028d40333bc1c438a4d4aae9041297fa2632fb8a28765b
SHA51272ad3caa8cb2e345fcc5624b58f5cfc538bbe8319c413a1c9b8329aea4aab4b5ba1a856a4b947c29116bbd5c05a63b27314d9a80f2181533a6d484cf34560eb3
-
Filesize
8KB
MD5bb41a02f04b6478c6677b5b68658c49f
SHA13bdb7ceafd09f8d4e8c304f0272714a6312a42d1
SHA2563aa1ab5a11089641b00d1fb44cba8c1bfc2f6ea76f183b83b3286c653437c0f0
SHA5127ab45340559c7daf128b2cc27cbc9c59d6bf1ee6c8e11287e6c98473d5073e8b5f03c62c1f591d0628ae7467b24724f3914a495709d0f806288ddbf1160ea852
-
Filesize
16KB
MD5b752279eb163f42826adf6211eaecc55
SHA192551e7d97e3fbaa186f9546881ce48834405a31
SHA2563bbab706b2e2e3e6fd92775b0aac354ed8bc3bac1ff1d53e655021cfda6183f0
SHA512e169a917fe3975297ede000336ad9831786dfb406c4c22cda942dc239a93a75f14bf62d035b761fa964dc3b17a96d206eede28524cc7614f94a236a3f2beca17
-
Filesize
1KB
MD50f560b407ee075d1bf780e662adfed90
SHA118f68cbbb396f6dbd3bc555fc06eaf168175ba70
SHA2566f3f344d82d31f59f805584e665c3d6ea1be5e683b1ad96a6093cb458f01246c
SHA51202ef6e8b5e7c7e913d1d5e1605234dedde7a8bfecb17e0462a5962e4101beea7a2a457093a322f6e011540b58ada52ee1670223cd79710f578c64073d279df11
-
Filesize
2KB
MD5f4fb7d6f9486e4a9dcbdf824902bbc3d
SHA1d242939b65eeffd8634037cb25038d8f4571efd0
SHA2567481dec217588dfc19389623f38b24522c22014afb0beb9ed386cf095fa97744
SHA512bddb054b80d63825523588ae54041907e7632421177ca3235cefb29ae2ac2b055d43eca96b92ca574fad01365ee955a560a91899c3230f07ef25d63464364c4a
-
Filesize
937B
MD50548dcfa07f228a8f9d7ff7ffee26594
SHA1a635afa95f034e071fca6940ba347c42d041647c
SHA25668215f3f7b30b1478ae503dfae6538c692ca127cb69ccd985d729465e9af470e
SHA5122b79de5bba09d5278e51510fcb65f85d9220a5ed3162fd1de76e643ca61cfc513efc83a5ec39d5f252c8b746542f022835802dec7aa353c0e45075766bdffdc2
-
Filesize
413B
MD5891adeb271db4e47d15efacf34f5f73a
SHA152c34fc491cd6dfd3278f46aa3a4d7aa6281ea3e
SHA256b071124cf0f43ae621174879ab53a3811758da0eeb8015ed0f7c4f236fa52ec5
SHA512372c5f55a14bffcfcddfec514618dedc69bd6f4c59a26fa08ebf954bcd96e3838c9f6e3e05758120a4f9bf02c33b2269be182bfb4f77cd691a6132102790113a
-
Filesize
203B
MD547dbf149d5fbc744c074ea3dfbee95bb
SHA1e59f8c2a5435b003f2b8ec8fa3dfa44ef7eb9836
SHA25699c26d4c3885da8fb812153c322481af1433aa679d38fc7854f4b9b12eb76d8f
SHA5129673bbb0131312adac2dcb2c4af26be15508b05a3a1d2fbc5b21370ddaf7839911c05d99788f644edc3c264553a28dace4dee1e3e1da5e46ee93bc290c76b0da
-
Filesize
162B
MD5479f68ee40159c7b054cb37229f8727b
SHA1fc4d14a06cd5eac38dba889db040e6bc547e396d
SHA25642f71298f56abf556a285e97c861e5a2e4287aa1672288cad6b9fc1126ddf97f
SHA5124424e4bebc6a99e223b15a1797dfc466fb55a3f83cc7d64d4d4fe08ee328d1de8d35e090a6a844bd435aa51c5ca036d1fe8dfefd0c2017759e16d8ba37a8c972
-
Filesize
104B
MD5dc272c25c9599626abfccf5d0992a811
SHA1beb5e7222c1911b28b1fd824de823d2179e71da2
SHA256137d5c775a3388b6f7e9a543b3bcbbb08c74a4314a526e673d47fe4872643b7e
SHA512df109362b2efd1f4a55105eefe71a42fc0b41b09b9153fd02077de06fe14c1087dbf9e6530921cbbf008f48035b69397a2d17fd4db9ddb34f0225f6698114279
-
Filesize
62B
MD5dea092318ca7acce21a65ac85c9d2b11
SHA1fc24ec3a8fbcb48a2e9141ba61da0fda5ef6d398
SHA256425bf26238882f2523d92eaaf10e61134c6ab0f370bd688375765f6a23ecd946
SHA5128649bf0d9a7949d46190edea839c2ce17ca4db1b7babaa22310386cfe92db83b0885815b0a6b8fd01254d1ad58f098a0089e068e1f67123fd38a72f635e45d18
-
/data/data/com.yxxinglin.xzid665/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzIxNzIxNTk3NDA0
Filesize1KB
MD572a1a368bbf29fc8af770c45988d44ac
SHA19c8e33484e8f3fd3c5bf6b301a807a6830faa7c7
SHA2565dc7e021554616b143624e62b72ba1396f676dd643a3bfbb0b31e856054640df
SHA512b65101c1397c6f1b70e84b123bb36db3ecb53017ab727de0b53ea05d6cf6e9ac0292a3d07bc8b487149b763de778bea5024b1cce3a4853a6644e67b310fa3dd4
-
/data/data/com.yxxinglin.xzid665/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzIxNzIxNjI3ODAx
Filesize1KB
MD545128bdf37074ed93e0ee6ec6e197d4f
SHA14d3589f36c68f9bacadc47ae8e00e4de6a1e99a9
SHA256d86b9e0a93a18b378de1fa7e637f54774c1dc301e37218541cb5af9abc2d122d
SHA512813d7313e0b17337aa59dbe24045d8dc38e7d4a04c9d5d546b069910cbff4a05d997833c16a6939052468463c3fe3fc1de8bfbffe0fe2ec06b73e5d4902c34dc
-
Filesize
350B
MD5f7defc505e53b7d68ef417a810fea0ec
SHA15d170c5634d35258ff60042aee2e3230691e0708
SHA256225e426835e4b32addc7fec67738938c12dbf94cc8958738f83bdb0e54413f6b
SHA51213fa2f56267f6a493b8658d22b96a88bc69ed8bbcf18157bb4eea3105998a01c71967d4e5add6aac3af771af2666d5c1ae29ed3dfc9a2b8d81a44fb023decd34
-
Filesize
178B
MD53ca929fdac18948cd9dc4dd5c6b29d89
SHA1fcdba05ae7b3a4ed7dff8b04572b7132c5ba7a8a
SHA256b424d730a3e8a6b7b647f3f3ed2bd985284a2906fc967960ee001c473b8761e1
SHA5129c7dad0bd704c757937704e83866e7537162252b9d23d7f9f920b9b80aad586ec1d91be6452077b73e495634b6593fbeffff015dcef78bdb7689908fb307bc82