Analysis

  • max time kernel
    4s
  • max time network
    138s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    02/10/2024, 11:23

General

  • Target

    0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk

  • Size

    2.7MB

  • MD5

    0a6837bb31efd91ec8df1419587bfb5d

  • SHA1

    8eb24fe20470acac40b3ae406824ca12b4ca68a7

  • SHA256

    70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7

  • SHA512

    46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2

  • SSDEEP

    49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.witskies.yoyogo
    1⤵
    • Loads dropped Dex/Jar
    • Queries information about running processes on the device
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4217
    • /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.witskies.yoyogo/files/1727868236898.apk --output-vdex-fd=47 --oat-fd=48 --oat-location=/data/user/0/com.witskies.yoyogo/files/oat/x86/1727868236898.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4268

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.witskies.yoyogo/files/1727868236898.apk

          Filesize

          107KB

          MD5

          7458007d4aa78ec3fa53839e5bf828bc

          SHA1

          26a34dcaa4a70e6b7ce10ac0753e3befd408f53a

          SHA256

          3c79a5d8c1881df5ee5ff7d1a2658e03171936a992175d99103bd4c270769aad

          SHA512

          11433b8a7140834d93a940713c7e614a592fa53200e6728d2ed19a3c16fbb1c7fadcf3b08c3ea4bc1e587d3b65096e6083d96841fbb35832a38e76337e58014e

        • /data/data/com.witskies.yoyogo/files/libicons.so

          Filesize

          107KB

          MD5

          a0532cf3213c94e922eb51650d67cdab

          SHA1

          8f9aabab8764146325fd5915e57028dcb345dde0

          SHA256

          fac3bb3f7e81f1975c6c3413b04c091fdcc133323c75822d19707bf99ee9f601

          SHA512

          14686da589937099c781d1d125161121cf8df7c13de5029c6c640079ae81b7c3efd8b969dd7408c2b8424122bb880641eea6c0a2d6519bc33062afd2e7a99b1e

        • /data/user/0/com.witskies.yoyogo/files/1727868236898.apk

          Filesize

          314KB

          MD5

          56316514f7aed2c51a4cabf099c9b922

          SHA1

          41740d6fff5dd1c8424e33238e96e3a5c850ccc7

          SHA256

          59cc5941d395b7c19c5dc7978355896cb46f51480ef4c6627f6c5bab28d28cdb

          SHA512

          9c04048e4e8e62dbdf8b6bf1760dba9e860733aee818c1a9413a1fdb73fbc714bd2b99529574c820e94b621a8f80231002554ad93c9d483f9d605644ecf4a916