Analysis
-
max time kernel
63s -
max time network
128s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
01/10/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
040cc51d01565b14cf3c11ab6856256a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
040cc51d01565b14cf3c11ab6856256a_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
040cc51d01565b14cf3c11ab6856256a_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
040cc51d01565b14cf3c11ab6856256a_JaffaCakes118.apk
-
Size
1.7MB
-
MD5
040cc51d01565b14cf3c11ab6856256a
-
SHA1
852aa3d23a6711280b38892dde20f7a5d998855b
-
SHA256
cd0da1005e7943dd81e884ace29271ce64d8907c7889096d14185a774d49fb6c
-
SHA512
fce5e289b7ee43da1edf7d7ee5f2f3e4ad6c5324b16ee51dd4d231d28dea0db236d092a078f2a6fb92e2cbba79bf6b8a03d65cd8766422a8933c8d63c34376f1
-
SSDEEP
49152:5gnFp/UXMX15rgSs94CrykT6MbYpxKPH0:5gFp7F5kX9nWkT6mYL7
Malware Config
Signatures
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 3 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918
Processes
-
com.cyou.cma.clauncher.theme.v548174402dc7b09211a299181⤵
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4251
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918/files/mobclick_agent_sealed_com.cyou.cma.clauncher.theme.v548174402dc7b09211a29918
Filesize572B
MD52d5ed3f66907dc13444f6ac839c57b77
SHA1992604b4c6524c5a93a29d46f5d5e3a3a471bb0f
SHA256f734232da4e0eb5b46f54c0848ddad8d0e8924be12660eff14c828b993511724
SHA512cbe60d8249a488219c138311ac70a4b3ab8de9e0f277894ce0e3849640619a88db3c43683825ee58fc41507a12b8f8bd8d4caa512a9cfe5694c2fcb525ff0383
-
Filesize
32B
MD5845d0390945ac0206a785f323c9ad355
SHA1c1730cafeef43fe49117d6a26b8e558039a5ca0e
SHA25670bde056dd140a6ad98d3fd2dffaee6881ea22db855b40df571d1e6b82fdfd36
SHA512e73c72b07bc97ff2b06ebc13357084ead85d23fce94ec0b772e72f1632f237f7d7fd91633214a3f5bbdf9aef5aec515e3ba7d0dddc7233c86df8dd53f72eec16