Analysis
-
max time kernel
178s -
max time network
179s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
24-08-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
bf71bee5557b56179ae9db87e315e80a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bf71bee5557b56179ae9db87e315e80a_JaffaCakes118.apk
Resource
android-x64-20240624-en
General
-
Target
bf71bee5557b56179ae9db87e315e80a_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
bf71bee5557b56179ae9db87e315e80a
-
SHA1
9c94814377a96799b86c5dfd0b3798d272b1e853
-
SHA256
6fbec5ca3918efb5d00eec529920e2390152d562c3cbd902dd7c8df4e1769d1e
-
SHA512
06b46c10a1cfcd98439c4b2303871e5aa8e755c6054ddcd5b2f2d824de06bb2cdeb58337e8f90073f2ab601fce666b40ef245d1f05616d9aded84e3e85ed11dc
-
SSDEEP
24576:LyoL0otaYtXMhek8X3lUKfcfIkuovSp04jro+rkjv6tq/13tdHbZKm51Ob83I:FQ7YthX1wvTvSpHjnwjv6tq/1XHNKmj0
Malware Config
Signatures
-
pid Process 4242 com.xamd.lrjy.xtzz -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xamd.lrjy.xtzz/app_mjf/dz.jar 4275 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xamd.lrjy.xtzz/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xamd.lrjy.xtzz/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xamd.lrjy.xtzz/app_mjf/dz.jar 4242 com.xamd.lrjy.xtzz /data/user/0/com.xamd.lrjy.xtzz/app_mjf/dz.jar 4311 com.xamd.lrjy.xtzz:daemon -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.xamd.lrjy.xtzz -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xamd.lrjy.xtzz -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 23 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xamd.lrjy.xtzz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xamd.lrjy.xtzz -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xamd.lrjy.xtzz -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xamd.lrjy.xtzz
Processes
-
com.xamd.lrjy.xtzz1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
PID:4242 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xamd.lrjy.xtzz/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xamd.lrjy.xtzz/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4275
-
-
com.xamd.lrjy.xtzz:daemon1⤵
- Loads dropped Dex/Jar
PID:4311
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
745B
MD50759339fd053d534d9862a6a2d628eef
SHA13c18cda5d55d118bdd8d338495b476c86a23de8a
SHA256195b3bcf16b9ba154c377f3ea3e932560d85f581f7d75cdfe63f690a9a0231d4
SHA51213a68745a3f212b7dbf0e11a9e1503ffcb2dd03d00f76140dbd46d1c2c6074052e7135234f3ebeb654a89a4d05c6526335af3a2c85d4c6a721b874ca6ced088d
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a1355ff9055ee480ee9de65387447f5b
SHA13d943b26ecbca6715624496aaf4c833e1a30eb6a
SHA25655c8e29d29a5b6e5b44029da5572e109203b4ea8a458c6140999f934b4ee8de7
SHA512573dd316e9ac1c02110ddae6c6e519deb20f99e53d07f8bca857a6074f0d0aacf3bc612f5f24586c873ab88053b0337e9cad6d8110c7f542d36530014550f7a5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD502a212534741ab7bf5462113dd16cc45
SHA11489c5b8c351e17ce7e20601f38aa7deb55737a6
SHA2567912bc52739c002d945e3de9ac98dc7a9c36772ec52cc29d33093303d173939c
SHA512fc6a57dccfbae254600990afcd954f3defb94abf2e773086a106a191e261be2dc91f2e8aac57856a355bd91c9aaa0c38afaf960a9405c65386a05c82618367eb
-
Filesize
1016B
MD5027b85ebd6196c94ab28be0f0c085398
SHA1d493d971476029a6c43a7017643c52fd6edf7804
SHA256eca91229f80174c66c2a2f640ba07d5e19cf8514c9eac71f0851909494196bd2
SHA51257f2d00eb38a7ebc0d1749c663dae169371dbd4d41e97c45ae8ed91c4315c8b59032b7fcadc842ee6cd8dd8ce6bd37ab0aca9003a3201f315d35789ee5c53a54
-
Filesize
1KB
MD516732e825b94c76c4182179db64e234c
SHA1365d5384b001df2ce57403024ccec7db6f0473d2
SHA256b3206931af18134d3fe2b96a8bbb1275fe58877c0d620a9a0c413e20bf4f41ee
SHA512adf747cd5061753ce0cc01da5002fae42802e3a129b3d2446fbbe9ecaeeb2d1d713d3a68fe4a68a904353db293c028e0c6009d0674e4e6a3791c1991616c13bc
-
Filesize
162B
MD5770d0a798a422fcf593bfa122898af71
SHA1a9b09762ef29b0c84ed6b2092c2f3ef19850f866
SHA256bcb8d29d9ee4272526d8db0d3a5503447a2c90af1d2ea1e8b1a9337ccde5d919
SHA512631619242a1ea2499ea6842ec95b0464e702997b37e20600e125c05cc8d47fef787243fc764a41e3930a112266c53e01f0ccdd86a84db7804e099fa91d8a6324
-
Filesize
204B
MD5f6b37664a1bd0739287765b653941abf
SHA16946607cfdab141152fd1e1a358945f693a032a8
SHA256a835df3852567f605488d77e022ab17b1154add31f953c3ef693849593b2dec2
SHA512b4df0a02abbfbae1d8bd57e826ed32aa35172171612a26dac5bdce3710615e052f2cb4c4c171d9f417e6197c352c0191f9165f3a02fb22fcca34b649f0e49d10
-
Filesize
415B
MD5c73ed259bfeb14e87b4cd4757af9c828
SHA12482a285d0f94602e205abd80f627b8c1b3c70a7
SHA2562412a33d37f8d4ddab17efd43f005f401d493e780e411e8d9346cb8c1a388211
SHA5121d68ab28838137651c8a0005a4a746b376773a071f800c8da0e2dfb519717eb8eb53d7a67ca75920e681d0cde09887e3d9ff9334cff016e9f2970d5c526558b8
-
Filesize
211B
MD50cf3685b480a3af8c7c0186701e3e852
SHA1261d9615dca1a8fb94e184d3751758188c92be09
SHA256a175647021ff6fc6d2218bba73ca2804ba759278f314d5d2fdcd62c029ca0f57
SHA512d82fe5273abd725afde36cc0e8ab520890d8b71aea37796ab16d773c9d75317b8e8e1b879264167b441227ef576df42d03ffd2ba9e58a8e7d0e86d3e55bddfb1
-
Filesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc