Analysis
-
max time kernel
148s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
24-09-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
f3ca571b2d1f0ecff371fb82119d1afe_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f3ca571b2d1f0ecff371fb82119d1afe_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f3ca571b2d1f0ecff371fb82119d1afe_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f3ca571b2d1f0ecff371fb82119d1afe_JaffaCakes118.apk
-
Size
357KB
-
MD5
f3ca571b2d1f0ecff371fb82119d1afe
-
SHA1
18a5fcadd8a9cd78dd937cdf03c5033026725593
-
SHA256
0f49416b6bcb6e755d999255fabb4c77c5ea7dedeb7e6cdb0925c4f23c1fb00e
-
SHA512
eb961874dc6f6b3c86c22eff0654f7211f88925006a6675971f12f02c772b125ba8510a765f81f7a21ade77a5f9468554453255d862259d93fed76cd7c9887c4
-
SSDEEP
6144:df5WDxZxFhtotuY8BDWhH3raNhnf+HdIq4WMp1OnW5pqbl1p5aptPJ34:6DxzouYw8XraNhf+9IdfpkuMlFSRJ34
Malware Config
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule /data/user/0/fddf.tre.hjgdsgkh/files/test.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
fddf.tre.hjgdsgkhioc process /system/bin/su fddf.tre.hjgdsgkh -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
fddf.tre.hjgdsgkhioc pid process /data/user/0/fddf.tre.hjgdsgkh/files/test.dex 4659 fddf.tre.hjgdsgkh /data/user/0/fddf.tre.hjgdsgkh/files/test.dex 4659 fddf.tre.hjgdsgkh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
fddf.tre.hjgdsgkhdescription ioc process URI accessed for read content://mms/ fddf.tre.hjgdsgkh -
Acquires the wake lock 1 IoCs
Processes:
fddf.tre.hjgdsgkhdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock fddf.tre.hjgdsgkh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
fddf.tre.hjgdsgkhdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground fddf.tre.hjgdsgkh -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
fddf.tre.hjgdsgkhdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fddf.tre.hjgdsgkh -
Tries to add a device administrator. 2 TTPs 1 IoCs
Processes:
fddf.tre.hjgdsgkhdescription ioc process Intent action android.app.action.ADD_DEVICE_ADMIN fddf.tre.hjgdsgkh
Processes
-
fddf.tre.hjgdsgkh1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
PID:4659
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621KB
MD5f9757bbced603e2ccb70bd0bec4e039a
SHA10a35bc10485713fbe8f512265c89d6a97bce839b
SHA2560128d03f6f519387751a6718b15e75898c3b7bb6a859b800ae514c239290d5c0
SHA512ad87f192444296fe0eb243007f1318c90924a2a59996ccb65d54f06674855238d506eaf42f804f85343ca08b23d1b535f03044a8472ded3cb4e3f49fc80a0299