Analysis

  • max time kernel
    14s
  • max time network
    137s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    01/10/2024, 08:52

General

  • Target

    052158212270341fc9b519b3e67f02e7_JaffaCakes118.apk

  • Size

    4.4MB

  • MD5

    052158212270341fc9b519b3e67f02e7

  • SHA1

    8122188025ffa7031bf1e8445f59b455dc50ba0e

  • SHA256

    5fb9733b4aa1fac3809a97bd3dfa50d1913589ba6f1e32883f9fdc2df24233b2

  • SHA512

    ed6c7990c6a07df6600518e4cccdb3e97bd0ba625b6c6ba738120b59b773dae951a805e76c6eef0b061047c3ef107e4446337fb3a8ba46d1b9b21753c4450025

  • SSDEEP

    98304:h5ft25/qEDPpHzdkST9jrqbVK0MljZEx9muMN+tBc:nt25ZDJr9vqJbM5qkN+rc

Malware Config

Signatures

  • BadMirror

    BadMirror is an Android infostealer first seen in March 2016.

  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
  • Reads the content of the SMS messages. 1 TTPs 1 IoCs
  • Requests cell location 2 TTPs 2 IoCs

    Uses Android APIs to to get current cell location.

  • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.loveplay.xmxx207.tmcps.Activity
    1⤵
    • Checks Android system properties for emulator presence.
    • Queries information about running processes on the device
    • Queries information about the current nearby Wi-Fi networks
    • Reads the content of SMS inbox messages.
    • Reads the content of the SMS messages.
    • Requests cell location
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    • Checks memory information
    PID:4251

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/.qycache/c3c71909ac2eeb641f8118822ce60794

    Filesize

    147B

    MD5

    1dff95a760040fe4d864acf13439e4c4

    SHA1

    36d22f26f858ccd610b7b4fd56a38399828b7975

    SHA256

    1d53ae3d118db1ffd95e01e894c20e207d47dcdf421658777c03a89e0ec6869d

    SHA512

    2ed9ed2406de550036b672b3986eb87c1ebd627b334637515d905562d7c1e78768de55c031927fccb8774ea7e52261376a2d4568b32720fb811c5f573e929b0d

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/app_td-cache/tdandroidgame

    Filesize

    6KB

    MD5

    96a4d459e4fd6ab1b7f549274cc82fff

    SHA1

    d5dad007c339f92d05cd554b07410d27ccc09598

    SHA256

    7279282f932506023be9b2d76fdbc28d9ec291497fc9a5a6632d4486aef8ab9e

    SHA512

    6edc69de7b92db89decb166f2f04bde6abbebd399156b4c4da40e04ac746aae175fa7bd2e81b21c8d38496717e2fa341422adb2901470ea7fde0425a2289b7df

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/databases/qy_db_pay

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/databases/qy_db_pay-journal

    Filesize

    512B

    MD5

    49071a4afe4e1309a1f95d19933003c0

    SHA1

    721dc5de1e93085dfc96557bcd519fd71700f9ad

    SHA256

    8b17802aa56b9c669fef6ea16d88d9608a46c91250a4016da413608b34e7d7ce

    SHA512

    03aa3fbadbf59ab79d565a48611666447c0364de6c227038fddf1e3fb6dfc02dd3e0e24308dcfa8ab44237421a8ef3a85f2043a06441cdd4ba1ff429abffaf5c

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/databases/qy_db_pay-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/databases/qy_db_pay-wal

    Filesize

    40KB

    MD5

    690f36239d2187e6dec9dcac3b916485

    SHA1

    29c292868506660a1d45d5e7e9c8c60f0608ac15

    SHA256

    357d0101a3384b60f1780dc265351abc4e9176904bcd9728b06c64a9586d6f42

    SHA512

    74d7d2edcc0b6772c7e74bfd66ec90f88048e1719919dbb53ab3150462eb0def92b8fff9d9e94b3585ccfb2b3087c55d45e07351d0e5e53dccad8fc488b8da5c

  • /data/data/com.loveplay.xmxx207.tmcps.Activity/files/umeng_it.cache

    Filesize

    310B

    MD5

    f4b4b6c6369f49d39569a201b9bf37c9

    SHA1

    f108dcff22db829ebb9ca240b5ff9eedea04fab0

    SHA256

    42d67d3863c3b30bb9498b6e01055fff1b7e2a328a0b35911c3e274e31611eb3

    SHA512

    615b3baa3bf356cd06a748a497c638d87edb5579da8f1b9e8400377cb90026219f4824319e0abe6271770a949d71ff6b99d662200bc21943aece98933a6a7124

  • /storage/emulated/0/.qycache/c3c71909ac2eeb641f8118822ce60794

    Filesize

    147B

    MD5

    c2c6a411fb025c1b1474f1efb201ddc3

    SHA1

    08a5e3ee1f557d9ad78dcac4a3f690bbd8d6c4eb

    SHA256

    a33cbb7578f1024bb5c26d1a3346636a8867d361b9a1ff317b9cb4229efbc0d2

    SHA512

    b149b55166690499f38dffd26fcf8571251536c3db052c48f3816a2ef26e03da02630b997198be87e472f2707150d92ea2292ab5210aac1c578cf150370986ec