Overview
overview
10Static
static
10c1f5a50625...18.apk
android-9-x86
7c1f5a50625...18.apk
android-10-x64
7muzhiwanapp.apk
android-9-x86
8muzhiwanapp.apk
android-10-x64
7mzw_d.apk
android-9-x86
mzw_g.apk
android-9-x86
mzw_g.apk
android-10-x64
mzw_g.apk
android-11-x64
stasdk_core.apk
android-9-x86
7stasdk_core.apk
android-11-x64
7Analysis
-
max time kernel
179s -
max time network
175s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26-08-2024 00:56
Behavioral task
behavioral1
Sample
c1f5a50625b0cd10266f1dc5413c810b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c1f5a50625b0cd10266f1dc5413c810b_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
muzhiwanapp.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
muzhiwanapp.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
mzw_d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
mzw_g.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
mzw_g.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
mzw_g.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
stasdk_core.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral10
Sample
stasdk_core.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
stasdk_core.apk
-
Size
2.1MB
-
MD5
e1dd5bacfa75b9cf6abf6eaa1635e3c7
-
SHA1
96a86954d989f634798c91523712c34eab06da3d
-
SHA256
8dc8a08cb4af889317d11fec26e2c1058f2af5056a4dbc25deaec8707073947f
-
SHA512
e62c106f91d7a7202411a6938ed721fa695257f205e93772a87c59804a899a1bafd4887d48f2c9f33e5fe3ab6965227beb3fee007515ceb926e83d0e990fcc37
-
SSDEEP
49152:V1anRWSRRAeAOHy5mWr7cZVsjFrcZzVCuSlH7WKYnRgIpLLw:naRW0AqyJ0vsjFGzoNK7nRgIpLw
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.dbgj.stacoredescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dbgj.stacore -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.dbgj.stacoredescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.dbgj.stacore -
Requests cell location 2 TTPs 2 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.dbgj.stacoredescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.dbgj.stacore Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo com.dbgj.stacore -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.dbgj.stacoredescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.dbgj.stacore -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.dbgj.stacoredescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dbgj.stacore -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.dbgj.stacoredescription ioc process Framework API call javax.crypto.Cipher.doFinal com.dbgj.stacore -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.dbgj.stacoredescription ioc process File opened for read /proc/meminfo com.dbgj.stacore
Processes
-
com.dbgj.stacore1⤵
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Uses Crypto APIs (Might try to encrypt user data)
- Checks memory information
PID:4672
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.dbgj.stacore/app_baidu_ad_sdk/__xadsdk__remote__final__3fb9a03a-a37a-4c51-8b92-9b6bc9ce1c06.jar.tmp
Filesize464KB
MD5df3e6828db973805bace2935787183ae
SHA117a410dc5ac7feddca328f2e11d74b38a8f9a07d
SHA25644e8016d3f7438c7e533e0b1d74c1083b07e5edcc5c291a50389944e81a3502f
SHA512fb21eed997566c04b17e3c195751d64f50321633bf1e8c25dfd820bd8338870a32490fb07568632f56693a93b5e9828745f0db9a0af9f3efcb715918de06fad3
-
Filesize
26KB
MD5c6d50df26fa685310e6d59640ce82184
SHA100a1ef171fb7915e9242b214a87111917ae018f3
SHA256bf0d190a7cb03b69abd0b723dd94a2664b4bd23ed3006ebe38583b554e705766
SHA512d42fd00fcbbb0045318b01956e08aa73d9ce7e0a1c82e07cd0da1fd521ebad618c48b3f312a6d05ff715a5a87d1eb43a83efd379db3927f00a4d6c1c0f3d9ef5
-
Filesize
85KB
MD53c850ffec5bdd850f123077ca210a411
SHA11c1ae4678b8a3b65640f047cb1bd72bc70d66f97
SHA256516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e
SHA512aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd
-
Filesize
85KB
MD5612d39d90a14a658e9eaf5de2d3309de
SHA1b8e1d341319c8f40fdd4c5885475325c5bce5610
SHA2561deb27da1fbb2dadef382c3a9495142db0d9d7845224e07f511ba26f9ba47061
SHA51226b03ff093ca85a56a5acabb737731895f47a53b552b0b85d6783e35052af8cfbd9b1018201151521b4cfb8173b1c29589d3063ff97cf4e5fbdb1b35897b301c
-
Filesize
36B
MD57a001b8b873cae3d9662ca2d821b53b0
SHA14c9f368d36cd85789338d190a7679bbd7438c8d2
SHA256f33ddb07afa8b06b49ed36f1da3443b897dbc109c057d74262402b935d6c7079
SHA512b720821f6aca0c07341583153440de042b870a900cdc8c7f6fccf4e7eb09137f76ee962a3fbf6fb3915be5f1435bffd6ffeda3eabf0a4ad0c52f3c45bdd2f837
-
Filesize
17B
MD50f607264fc6318a92b9e13c65db7cd3c
SHA1c1976429369bfe063ed8b3409db7c7e7d87196d9
SHA256c248c629af1fe0a8c46b95668064c1d2952a9e91d207bc0cc3c5d584c2f7553a
SHA5129dbd40b135b46c7be31b8c7d11c75b0b179af3a6550fca52ec447583aeb50aaaedb4b1e9373cf8826615149549a2efaee04efdc9a282e3a6b387c73099c13fb1