Analysis
-
max time kernel
178s -
max time network
148s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
25-08-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
c0a52b8d9918b63e45d879bd94485643_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c0a52b8d9918b63e45d879bd94485643_JaffaCakes118.apk
Resource
android-x64-20240624-en
General
-
Target
c0a52b8d9918b63e45d879bd94485643_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
c0a52b8d9918b63e45d879bd94485643
-
SHA1
b02f87963bf76695ee0fec182e750c8ddc4678f3
-
SHA256
ed9b8486ef7139900343757cc864efa787c64e54704af8e3e2836366c3d69e6e
-
SHA512
6ecff85cdead1e003b19e721f8b93f3309d15265ec33ef83160b580761a539230c050945834d3b6894cc176b8a8cd1a96d3bbd16f8a690556fa5e0eb59afb78a
-
SSDEEP
24576:6cEoL0otaYtXMuSprkM4FqD5Bl0ZHqU+3jTo+U4j8vgq/13tdHbZKm51Ob83P:hQ7YtmrkruBl0ZHqj/Bj8vgq/1XHNKm3
Malware Config
Signatures
-
pid Process 4263 com.equq.ylbf.dnxd -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.equq.ylbf.dnxd/app_mjf/dz.jar 4293 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.equq.ylbf.dnxd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.equq.ylbf.dnxd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.equq.ylbf.dnxd/app_mjf/dz.jar 4263 com.equq.ylbf.dnxd /data/user/0/com.equq.ylbf.dnxd/app_mjf/dz.jar 4329 com.equq.ylbf.dnxd:daemon -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.equq.ylbf.dnxd -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.equq.ylbf.dnxd -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 13 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.equq.ylbf.dnxd -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.equq.ylbf.dnxd -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.equq.ylbf.dnxd -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.equq.ylbf.dnxd
Processes
-
com.equq.ylbf.dnxd1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
PID:4263 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.equq.ylbf.dnxd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.equq.ylbf.dnxd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4293
-
-
com.equq.ylbf.dnxd:daemon1⤵
- Loads dropped Dex/Jar
PID:4329
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
686B
MD5189dd954b93d7010fc7c0114751fd8f5
SHA1419340a0d41bfbb02fe9fec46d78e701c1dd1816
SHA25669fa20601dbfbfdb6b37593c21dcc2b13c3627f9542c4ac67fcd50a3a4ddbf01
SHA5124f92599dc829d197c6a8c04c4b6bb7d1120127ce698b5de862928238e4b771a2efe10adc8215f1393569960561b851b466cec04a809648bad87c9a1b1549e3be
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD555bc2461eebaf8fa8eb396539aa79356
SHA1724059a2ce3edf2f15efaea5324c63ada17478f9
SHA2564c4143ac4b80bb58fa61d313211a3d2b838efdc5c8a6c028b84313a9644e2557
SHA512cd93c0e0c9edcde6b1701afc2f797f8c8dc6a3b52dea6e390bac1601d577183564144d17e4fa3d329caf334124de4c0e85de542f81080ee4d977e74afea62d0a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD5ed5650568bb451a8927b50b0b492ecbc
SHA1443123a8bc85d0ed1595ee94e256342d7302b99b
SHA2562c7e528719e0d9a39d081a674badeedeb9b2c9b4fe1f0462c453785fd2af4e83
SHA5120eec9f7781b96774f4f3281d8e80882923f347644ade4bff19c3406f15d3c6b425c235d70d5225ce21c01c7eea2e29967088426ae4e6589bc6cc2a06cdac1a53
-
Filesize
1015B
MD56b035848f343565776aa465ae1d65fc6
SHA179731da618f499238d6d8304ac6b8e602c24e97d
SHA256ed7ff0e9efc827f66453509e8fb6cd699b13e5176c0824625a45e0c9808ad577
SHA51298025b07f25c176c0765dfdfaa9811af72ccc4242ce3d9e9b790cb1e0c9f053df48c974aa36a20fde3343cb124e9dfb85f50467da404d667c2c687ae546e3297
-
Filesize
1015B
MD523d162aa3e787ccf6a4984985ee72fc1
SHA141d8cd579b8b25dccbd1e11b4a1e88dae2ec3a62
SHA25659c5405b19c6c7e8900d561209b06d99357f2ad93f312021c8e8b1f1b73ecf03
SHA512c6b1d0493d0b29c422b9df3d894a2c7c8b563595eaefbfcfb2eeac7095779d9bfc122aa45da05ae31d880aa909e463bd2a8d565ba6435763fa57809e3abfd7a7
-
Filesize
162B
MD5b765fc76da8ee8f49cb0b3d58c45d3f8
SHA1b8a832181423cc4f5400657f95541d61e98764be
SHA25657b5eae37a0e4e4728c7104e54de3fb4ae5f31cc27e38344c7e78284ee8e775d
SHA512709a43696af2d842c87b4735b7128204b557fee60f76d6b93d7b3f5e3e057e36f3e23f2a2abb51f5ffa33438cadc93cf1fdb54b64496e9241004b3059d0188a7
-
Filesize
204B
MD56582902c3ce09baaf8743238bbc34668
SHA1997bf8cf4fe68f865a110e9455ac567c90252635
SHA256e66ecf79fb02f1ce86d98188d8dd36b8b8a3619bccf7f7e63444698cada5b6b2
SHA51219502dfa1bf5da6b97d887cba06014badb07faffa988925d08a4fd27aaea966bd7027f73aa84a9343613e6ef12bb3e5377ab50136f2c357f4d2ef4c127b0f011
-
Filesize
415B
MD53a267be31467c9a2ceb149c45f6f55c8
SHA179eada03839c99723821a9e450f07dfe528b4859
SHA256596c4cd32996221f157b16aaf2a75dd4b4e8f349fd27e5d082c9077eed83187f
SHA512421bbad6b6764c57312b84e82c1ad04dd0557b75bd770bfdcbb3a8c96e27603ce99909aeedee3348ac1c844be390f45e81aaac4e755acf6cda02e7013dbdca07
-
Filesize
211B
MD503c89e950be105004091650c21e012ec
SHA1185be672f25ab9d9786e33c2866bfe5745cabd07
SHA25659efb5fea1bfbd03256e92bc731652a2e0b66db98146dc81f10a5002ae444520
SHA51229e86a9eb140360bb879a622de6182523e02b985ecc3b7c739f57b015a7d166bb32b7a1e8ed4fb54578d48896ba9bb5a0850003b17fbc226efdb050efd9f2db3
-
Filesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc