Analysis
-
max time kernel
5s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
12-09-2024 12:50
Static task
static1
General
-
Target
dc5098f80a671f955e07a5b809c4b320_JaffaCakes118.apk
-
Size
13.5MB
-
MD5
dc5098f80a671f955e07a5b809c4b320
-
SHA1
a1ee4f6c837d16091d73283b215a3ae9024a8d6c
-
SHA256
4ae681ce52b795fca62ca8a2242182c10d40cfa773a2d6de6a2b46707493fb2a
-
SHA512
95b8119fc8de110cb126af84e8bd440ddcf0040fa9e6cad00a23f812ac4908cbaaa84e6814caf117d98e7569e18b0114ee09b66fb3ecf5637a06131fd0e85e35
-
SSDEEP
196608:KmablSPeApmGWxwETnK6CNZoioRVdIDuF1qT5aeONWbWceGDODXrsxV6e2pzvjAy:KmDP9p96waKvNZIta6+OHGmrS2LjAy
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.moyoufang.cathgrtf/app_qsaojm/classes.jar 4287 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.moyoufang.cathgrtf/app_qsaojm/classes.jar --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.moyoufang.cathgrtf/app_qsaojm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.moyoufang.cathgrtf/app_qsaojm/classes.jar 4255 com.moyoufang.cathgrtf -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.moyoufang.cathgrtf -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.moyoufang.cathgrtf
Processes
-
com.moyoufang.cathgrtf1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4255 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.moyoufang.cathgrtf/app_qsaojm/classes.jar --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.moyoufang.cathgrtf/app_qsaojm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4287
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD564ff1c82604a9eb14561ed15c8c310ea
SHA16b21fde3a3e0615f96e66280dcbbd531ffb2dcd4
SHA256e7e41b7128c8bcefc7f8fe74f9e998f2d0682cb08b29afeb84b84c036228f239
SHA5129d5fb2ab9361a217a1205d474db2adad391dcc7978fb5cfad88f0506adc8faa015b29ae3aad16523be0d1a07f9138ea77b1ace4d480559a57fe2421dc50d9a36
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD59c10a153054fe275a528cfdabaf2c7b7
SHA14592ed9d6689ebbfe3e3e9f752ff09e405d14ae8
SHA256803205a60d6a2d5b6ed59ea81a86a1f1d831061d9eb2921ce8150232ed46ce77
SHA5125420be6c384b162be96901f8455821faf8afb6114b178a5e97ac3b3b4a2e0d1a6e22447582f2106ff14f6037f68588ad08dac406f8f6e0a0bbe803fc2db8120b
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
148KB
MD54d82c601e95212e1f3ffbfa0da27d81d
SHA1ad91ed6354a4c28d9554fbcb0ff862ef2c3f4c1f
SHA2568a3a41cd35a7d10b6fd59c99accb7d14810c054ca3b4dbc77399277f7dddda6a
SHA512b54c497101d8bc51d415734aaf74a34a763b50211aa1099d16ffea3456ea3ae6c7162edeada664e21bfb2851b8ac7e181ec8602034def6bad43beebe314ddd9e
-
Filesize
158KB
MD5d7ccd62aa5830b7b598b5a7eac4422a7
SHA1b3eec7571a72d886f59645b40b92829562fb4dcb
SHA2562dd7f5d95d3989645366b9c5eb016aae36213a6cda739878a5253cf37ddbfcfc
SHA51261208cc00c43ea1637f4a11754e2e1daf9c8c07a1ed79c73a3b9057a0e682293003142ac6305c99149a88f83cbc275febcff5cde02da0c3bfbc3b066c6f85ad2
-
Filesize
158KB
MD5e846192989ec64243fd983c5a3490120
SHA1f50f90c23c98cc8b308ea67367c7d2669605d0a0
SHA256a0bddbc1d445292ae8bd615593d692480cc1afaa7597544ec87397b5700d7555
SHA512fb3162937cefe90c8bd9a23392d30311126215ab4e1c052b59018fb7f72ca260ead2ab12657e78a201e2c9f4b438d8c3aac6605007f8d25ee12ac0bea6437c88