Analysis
-
max time kernel
131s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
09-09-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
d678d42b2ad53b1efdacbd71d3b1be4f_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
General
-
Target
d678d42b2ad53b1efdacbd71d3b1be4f_JaffaCakes118.apk
-
Size
6.0MB
-
MD5
d678d42b2ad53b1efdacbd71d3b1be4f
-
SHA1
25e49e036ff7f5c1976177c7440e520982495e2a
-
SHA256
b2429dc2aa1b3642284c24476d4997e27c4b47a34123eded5b9121a563cbe190
-
SHA512
245ebecd974a76258d3beab35d995ec1b3640195029a99c4b1440816d64bf31cb8ff622d125cbda74ba465d3f548e3333282800d4461d2e18022fe6e475b0298
-
SSDEEP
98304:O4GqeXvExMVEhux9EjRoP2DWn0EetJX4pplxxe31Wg8vWzQgv3LckBR6EskyDip1:RGv4oxQRoN0FSlx031W+/3Qkj6EJHoQz
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses wsddsp.ping.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo wsddsp.ping.com -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo wsddsp.ping.com -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone wsddsp.ping.com -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver wsddsp.ping.com -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal wsddsp.ping.com -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo wsddsp.ping.com -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo wsddsp.ping.com
Processes
-
wsddsp.ping.com1⤵
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4269
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD587bb56a05053fc362d9f086ba6132b77
SHA1742c75b5e50e84c8b2b6dea178c186ad73fdf01a
SHA256d5351eaee64275fb1cb853841b81071d505bc6b3d3997a3e64e87b7d81a0819e
SHA512a14cdad074a77336d1868af28d165da7d5a5f0c92998788075962304d24dd290a1c726144b69685256a76ff2042add936de1c7cd55e560e34f96709697cc5b99
-
Filesize
32B
MD593ee94cc98ee90a0487c19f2bab59edf
SHA13a163f389f28f5a0a53f7ab2d547be9d9de41ae5
SHA256dd8bc6dee77f3156d4e761ed212bc3488784f593a2911a6e1d5a666c6e15edd0
SHA5127acb959c136c01f0c711d8961b682904b3cdfbc7731f0ab91a890e97d5e344db8e9413593bf279ec876a9de5da0cd57f0002023c5a8093c9ca45a734bec0d984