Analysis

  • max time kernel
    179s
  • max time network
    185s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    26-08-2024 15:15

General

  • Target

    c343198b04d56cfc3fd442a995dea8ea_JaffaCakes118.apk

  • Size

    436KB

  • MD5

    c343198b04d56cfc3fd442a995dea8ea

  • SHA1

    6441de9bc0afa2dd32d0ab02f1be5246defb8120

  • SHA256

    2929c003ddaca6fb379719a69ce6aa59029c87ba25106675f2fc81891a4e3a62

  • SHA512

    b5616b007e1df8cb1d3eb7fee9b44285a8b8a54511261e05e1a1cdced149b04660ee04a5b053f5cc9b9d68baddaf5310bae0976ba00bc04652443854f5231a72

  • SSDEEP

    12288:XXI4EDwOtOckYHiQAvGtXKEDH3tQg7q0woQVNOi6JvO:InDrkpYfAO8ED97u0xSO+

Malware Config

Extracted

Family

xloader_apk

C2

http://45.114.129.49:28866

DES_key

Signatures

Processes

  • com.yzpk.mpzw
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4490

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.yzpk.mpzw/files/dex

    Filesize

    766KB

    MD5

    474a6c270ad9ce11d542743d22f4f618

    SHA1

    5465c0640e725a1745dc32aaaa455a7e88b6df30

    SHA256

    d37c5d615adc341d03f84b43e8fd060c4b8de258420f4d9076428e37039d8510

    SHA512

    aebeb07a5daacbb1a33eb26cc472393e9341c01d2413926ed3101543f77e6bb4b0884fa2a49ea9947bdf99f6bdea6deb162ca1cfcda25be16a21d3767be2f4fb