Analysis
-
max time kernel
123s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
08-10-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
27463defdd0d0e389c9c8b4a20aae388_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
27463defdd0d0e389c9c8b4a20aae388_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
27463defdd0d0e389c9c8b4a20aae388_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20240624-en
General
-
Target
27463defdd0d0e389c9c8b4a20aae388_JaffaCakes118.apk
-
Size
3.5MB
-
MD5
27463defdd0d0e389c9c8b4a20aae388
-
SHA1
41cef6a466fd53505040dbb43a885df351491022
-
SHA256
a240359512454fc38f8f1dd932a2989a5f05c9413a29201d5c53f21eecd18284
-
SHA512
246ef7e992e9860ea770ca47619a237c41f2c23f169f941ee6d8b7d8f2302626e2fa42aea277ca43a5edae8a85bf11cbda4e58a17284fa007458ae973cb6f75f
-
SSDEEP
49152:oaRAsviAEkl7EwNZagEwNnHblM2A9N2A9oWAyrCZRH9xJhL6nT+j++wQSXXjMfvs:DR9mrNTWnHxMDy5xT+T+JVSnjo265m
Malware Config
Signatures
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo cn.zc889t.zchx.client1799151 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone cn.zc889t.zchx.client1799151 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cn.zc889t.zchx.client1799151 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal cn.zc889t.zchx.client1799151 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo cn.zc889t.zchx.client1799151
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD53559ab5c3dd4fd50eaf05a5b4d2c38e3
SHA1dbd9d8c029dc267393ad07f5aaca9a4d2af5d8ab
SHA256327e6eb3c0be267773ae55e6efd7e3ea2175991d92fbeac13232bec5fc691374
SHA512047cf5d7486139c19b048ba029fa93adc2427f6a990ce985fe911bf7d81c1fd76956eab2294a8c139a172efba6e934154cbf77ecbe75494aa3dc218b85e9ff66
-
Filesize
182B
MD5658a293a4c551f5aad8ccf4afe134414
SHA13d61438e242d567c06ff83f5cd6995d3c64af1a4
SHA256708037923d15af3c644f37840eb7a55e880a5a5223ccfce7b3190adc4efb0faf
SHA512773f53e5fc7e35a9ea304e3ba15438879e85f89e311852cb8ab5389a06a6d2f3ab115632bc7da8f70c74aa67fabf3aec5d14b0c0fbdacf34469f646849e86542