Analysis
-
max time kernel
3s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
18-09-2024 20:24
Static task
static1
General
-
Target
e9e93e6a92840d96c1af18bd3931d786_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
e9e93e6a92840d96c1af18bd3931d786
-
SHA1
dda33cdec4dc48c3c302a6a1ed64f10fda138520
-
SHA256
496d30a0e7a6e3e1a21e7240d70881769d2531e0e54f0f4d29c6dbab03ebbb94
-
SHA512
46ca0bf1ef9b2f225b441305d7218051a1f353fe56214bca90b8104b3925f4780f2a379bc5cbfcb140012b7f8c262236d5c18f1aa81c8f76b6ff9de294802e84
-
SSDEEP
49152:HPWa1x+NE0Radp03DIGMAUYDptOQmT12MwZmYL9:H9x+B8dp0cGzUYDpgQm729
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tft.nyblvu/files/xio/XHHUm.jar 4243 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tft.nyblvu/files/xio/XHHUm.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tft.nyblvu/files/xio/oat/x86/XHHUm.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tft.nyblvu/files/xio/XHHUm.jar 4214 com.tft.nyblvu -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tft.nyblvu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tft.nyblvu
Processes
-
com.tft.nyblvu1⤵
- Loads dropped Dex/Jar
- Queries information about active data network
- Uses Crypto APIs (Might try to encrypt user data)
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tft.nyblvu/files/xio/XHHUm.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tft.nyblvu/files/xio/oat/x86/XHHUm.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4243
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD5a92335d08a0af552bcf11160d7c3a7fb
SHA1fe1c3ac2aa6acd4501b0ec73aab2b91d5c63ced9
SHA25619627e79f18adce1ddc131063079d313c72e92e5d99682a40331b4d0493c4c44
SHA5128b61fb52f7b2ee24da889e316cf7ec68b7589a960f27be1285635d7524aba6b4dec9e8708a1d1c60a6ee16c21bf02fab26f89622f6971174cca619a4d6353024
-
Filesize
2.9MB
MD59dd06fa132f4c31605776e7889df91a3
SHA1c9a5ac001fb1d553492eae18c9f6c9c85464a143
SHA2567da8cf9c8d707d20223ea45a304ed9833956592a949b704318932ed9fbcbe665
SHA512142add63093ce2c40236bf6132e15581d456d79d0903c1213a20a125979fc7f62d0df4dc1de75412c1d8c6419fd8f508a06e9c2e43d915cc8d37e562e3dcff3f
-
Filesize
2.9MB
MD55d9aa2b3757c19de41687e710bf75da9
SHA1898004702420c5ee65e81360997bfd361ab5682e
SHA256a99f45c2732a7c907586f35745bf9ab1211b227c1d81b0a17b4ee8b3593426fd
SHA51244530d5d1fd229566f01ff933871f3ae7fd254d92f81b8df4b9312743df42bd1fa4daa61e6e082f16a0a808d56ee04949c210e8ce10c6dd0e206c05018346e10