Analysis
-
max time kernel
14s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
01/10/2024, 08:52
Behavioral task
behavioral1
Sample
052158212270341fc9b519b3e67f02e7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
General
-
Target
052158212270341fc9b519b3e67f02e7_JaffaCakes118.apk
-
Size
4.4MB
-
MD5
052158212270341fc9b519b3e67f02e7
-
SHA1
8122188025ffa7031bf1e8445f59b455dc50ba0e
-
SHA256
5fb9733b4aa1fac3809a97bd3dfa50d1913589ba6f1e32883f9fdc2df24233b2
-
SHA512
ed6c7990c6a07df6600518e4cccdb3e97bd0ba625b6c6ba738120b59b773dae951a805e76c6eef0b061047c3ef107e4446337fb3a8ba46d1b9b21753c4450025
-
SSDEEP
98304:h5ft25/qEDPpHzdkST9jrqbVK0MljZEx9muMN+tBc:nt25ZDJr9vqJbM5qkN+rc
Malware Config
Signatures
-
BadMirror
BadMirror is an Android infostealer first seen in March 2016.
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.loveplay.xmxx207.tmcps.Activity -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.loveplay.xmxx207.tmcps.Activity -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.loveplay.xmxx207.tmcps.Activity -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.loveplay.xmxx207.tmcps.Activity -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.loveplay.xmxx207.tmcps.Activity -
Requests cell location 2 TTPs 2 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.loveplay.xmxx207.tmcps.Activity Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo com.loveplay.xmxx207.tmcps.Activity -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 6 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.loveplay.xmxx207.tmcps.Activity -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.loveplay.xmxx207.tmcps.Activity -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.loveplay.xmxx207.tmcps.Activity -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.loveplay.xmxx207.tmcps.Activity -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.loveplay.xmxx207.tmcps.Activity -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.loveplay.xmxx207.tmcps.Activity -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.loveplay.xmxx207.tmcps.Activity
Processes
-
com.loveplay.xmxx207.tmcps.Activity1⤵
- Checks Android system properties for emulator presence.
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Reads the content of SMS inbox messages.
- Reads the content of the SMS messages.
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4251
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD51dff95a760040fe4d864acf13439e4c4
SHA136d22f26f858ccd610b7b4fd56a38399828b7975
SHA2561d53ae3d118db1ffd95e01e894c20e207d47dcdf421658777c03a89e0ec6869d
SHA5122ed9ed2406de550036b672b3986eb87c1ebd627b334637515d905562d7c1e78768de55c031927fccb8774ea7e52261376a2d4568b32720fb811c5f573e929b0d
-
Filesize
6KB
MD596a4d459e4fd6ab1b7f549274cc82fff
SHA1d5dad007c339f92d05cd554b07410d27ccc09598
SHA2567279282f932506023be9b2d76fdbc28d9ec291497fc9a5a6632d4486aef8ab9e
SHA5126edc69de7b92db89decb166f2f04bde6abbebd399156b4c4da40e04ac746aae175fa7bd2e81b21c8d38496717e2fa341422adb2901470ea7fde0425a2289b7df
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD549071a4afe4e1309a1f95d19933003c0
SHA1721dc5de1e93085dfc96557bcd519fd71700f9ad
SHA2568b17802aa56b9c669fef6ea16d88d9608a46c91250a4016da413608b34e7d7ce
SHA51203aa3fbadbf59ab79d565a48611666447c0364de6c227038fddf1e3fb6dfc02dd3e0e24308dcfa8ab44237421a8ef3a85f2043a06441cdd4ba1ff429abffaf5c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
40KB
MD5690f36239d2187e6dec9dcac3b916485
SHA129c292868506660a1d45d5e7e9c8c60f0608ac15
SHA256357d0101a3384b60f1780dc265351abc4e9176904bcd9728b06c64a9586d6f42
SHA51274d7d2edcc0b6772c7e74bfd66ec90f88048e1719919dbb53ab3150462eb0def92b8fff9d9e94b3585ccfb2b3087c55d45e07351d0e5e53dccad8fc488b8da5c
-
Filesize
310B
MD5f4b4b6c6369f49d39569a201b9bf37c9
SHA1f108dcff22db829ebb9ca240b5ff9eedea04fab0
SHA25642d67d3863c3b30bb9498b6e01055fff1b7e2a328a0b35911c3e274e31611eb3
SHA512615b3baa3bf356cd06a748a497c638d87edb5579da8f1b9e8400377cb90026219f4824319e0abe6271770a949d71ff6b99d662200bc21943aece98933a6a7124
-
Filesize
147B
MD5c2c6a411fb025c1b1474f1efb201ddc3
SHA108a5e3ee1f557d9ad78dcac4a3f690bbd8d6c4eb
SHA256a33cbb7578f1024bb5c26d1a3346636a8867d361b9a1ff317b9cb4229efbc0d2
SHA512b149b55166690499f38dffd26fcf8571251536c3db052c48f3816a2ef26e03da02630b997198be87e472f2707150d92ea2292ab5210aac1c578cf150370986ec