Analysis
-
max time kernel
149s -
max time network
134s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
04/10/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
1221a47687ee859ea59b060d58f79c7f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1221a47687ee859ea59b060d58f79c7f_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1221a47687ee859ea59b060d58f79c7f_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1221a47687ee859ea59b060d58f79c7f_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
1221a47687ee859ea59b060d58f79c7f
-
SHA1
a9b749c29369ab7ae160584de2c9194f60baa715
-
SHA256
c32517f02f97578f413ef91781a403b83133aaccfe1512945f4c5118ba7da394
-
SHA512
6d0c09677c9b1d9c6730dfdf23c70d8010a1d4e2aea18caa4fb18f4e0cbdee67e8036f6179d5f51003e3ea6e5504d0034730ebdb50d785aeb996d9413903d22d
-
SSDEEP
24576:VD89YbkD2yEOmcqdCyE8hisiulFlKFwlF+FpFF1+YMjQzdNMVvZyg2QGWO9:temcqTVEulF+dv1aVvZr2QGj
Malware Config
Signatures
-
pid Process 5090 com.rbvbjwqtu.afcqdtg -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.rbvbjwqtu.afcqdtg/app_vcaciduxd/lcyck.jar 5090 com.rbvbjwqtu.afcqdtg -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.rbvbjwqtu.afcqdtg -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.rbvbjwqtu.afcqdtg -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.rbvbjwqtu.afcqdtg -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729KB
MD539090cfe245505515af32f92473e506d
SHA1f9c09c440b9f4e7d9bd72998a584705cea20c9e3
SHA2561c96a049c50a66319cc00a17fba66b13abcfd0b9ef98a340bba277a5868f1b9c
SHA512e4f24b60499cd042d34bd4de05959fbc4fefcdf9d7c0c94cf4a4fcdf3d72482454e8bb5b614e8ae270787695296d269f092a839d1350ba0da439ec9fa88ce8e8
-
Filesize
310B
MD5b9860531a4307bf86ecc4188bb40fda9
SHA1a5c3606b7d7d0e80d0036473ae9f4973be508920
SHA256dc83ca1cffa4e8378ae63a2a528483774221d64bdf4ee280d6697d4f2a9c5a6f
SHA512566f95bdf8ca195a06eca3f9d3551193d838e170c10d5e6358b3ec634bd55b45736fafedfaaf4c7375ccb8968d814a7ae94683e9d38075a03b87b63ff1a0af2a
-
Filesize
1.7MB
MD50168d6653c8b573a3ca3ff7eb6593a9b
SHA1fbb9af15c90ba7ed03d3f588f672efcac1b8799a
SHA25691c1cfbadca246cd5d47369766878f771f13c44edb49a483700b8bf211218c1b
SHA5126db07d4a69abbfd270236a6c7d4953487ee3c2d06c01db8758b3dfe36e9997d47fad8c177ecee141eb49acbacbd30acae06f53074d556d0dd0fbb323abc10a4d