Analysis

  • max time kernel
    179s
  • max time network
    138s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    28-07-2024 18:42

General

  • Target

    1d198bfdf80fb593751cdef9d6e12820_JaffaCakes118.apk

  • Size

    461KB

  • MD5

    1d198bfdf80fb593751cdef9d6e12820

  • SHA1

    c14215253bbaca74d3a7d93e13ba9c32f56dc6dd

  • SHA256

    be5414be86d1d17ab9432bbcfca818895688f1f8d5027cd5eff5487f870589d5

  • SHA512

    d0e192712b582501f840915fd098f3e28f1fbee1cb562f495fa4e59236290c544832bbf05d398943ad7bf4f18ec8a99bf0b1ddac217728dfb68503f90ac890a8

  • SSDEEP

    12288:osSmz25StpYLuVmKAq7D+0bNX5nE6NN+Kwdrq6c/AkQ:jStElVmhqW0bNZNNcq5/AT

Malware Config

Signatures

Processes

  • com.tmaw.qcof
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4635

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tmaw.qcof/files/dex

    Filesize

    782KB

    MD5

    4c3346a81c855b0bf5c747136756691e

    SHA1

    4bb0c9d83b541a165b783a68bffd75bc63da6073

    SHA256

    1dd240c6acb483a9cbd9e5ab18108488c4325aacc7687e51063d898b9242d377

    SHA512

    fc6d05ca5145097b2096bccc1bb729a8e98f72b038db08499f268bdb5244a81466b57326e249f6dc1d9c5c159d59b696dfe621f864b659aac21f28d43fb7d4a9