Analysis
-
max time kernel
149s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09/10/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
2d135a302996dfac61f9a5de4bb76cb5_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
General
-
Target
2d135a302996dfac61f9a5de4bb76cb5_JaffaCakes118.apk
-
Size
12.8MB
-
MD5
2d135a302996dfac61f9a5de4bb76cb5
-
SHA1
6e579972d71405b1c8b022deb5f40b5582b52aad
-
SHA256
f4ed3231565efb95e55b16861cc1ef06e2bd2177ad3bb948f43acc5c314628cd
-
SHA512
7387fac3fa94df7fe87ee3f3e1662839ad6c8b17a036399ebd0e2bb3dcefa49e5bba5bce1597de2b90ada561fdcf808256aaec4d4f84753a919027dc07019104
-
SSDEEP
393216:Xxpk/uPXe3c8xINt1tGTtWPn3CNeU1G8yE3rbhMp/:hpgufe3Baz1A6nSAU1cCq/
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/app/Superuser.apk com.ninexiu.sixninexiu /sbin/su /system/bin/sh -c type su -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ninexiu.sixninexiu Framework service call android.app.IActivityManager.getRunningAppProcesses com.ninexiu.sixninexiu:pushservice Framework service call android.app.IActivityManager.getRunningAppProcesses com.ninexiu.sixninexiu:remote -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.ninexiu.sixninexiu:remote -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.ninexiu.sixninexiu:remote -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ninexiu.sixninexiu:pushservice -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 9 alog.umeng.com -
Queries information about active data network 1 TTPs 3 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ninexiu.sixninexiu Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ninexiu.sixninexiu:pushservice Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ninexiu.sixninexiu:remote -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ninexiu.sixninexiu -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.ninexiu.sixninexiu:remote -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 3 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ninexiu.sixninexiu:remote Framework service call android.app.IActivityManager.registerReceiver com.ninexiu.sixninexiu Framework service call android.app.IActivityManager.registerReceiver com.ninexiu.sixninexiu:pushservice -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 2 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ninexiu.sixninexiu Framework API call javax.crypto.Cipher.doFinal com.ninexiu.sixninexiu:remote -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ninexiu.sixninexiu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ninexiu.sixninexiu
Processes
-
com.ninexiu.sixninexiu1⤵
- Checks if the Android device is rooted.
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4238 -
/system/bin/sh -c type su2⤵
- Checks if the Android device is rooted.
PID:4302
-
-
com.ninexiu.sixninexiu:pushservice1⤵
- Queries information about running processes on the device
- Acquires the wake lock
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4323
-
com.ninexiu.sixninexiu:remote1⤵
- Queries information about running processes on the device
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4362
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD51c4274aa7a9a5cac8c6d1df71e4588c6
SHA1abaecd685e01cc68801292e3dc7085654a22feba
SHA2563f6cd5f480ae69859b7841450f3d032c528ba385ebf9f371b9c8fdc6eb4231be
SHA5121adb95935798607bd36cedcd183924d3068f50097d017b278da7caee7771532b61ec3606f6189b6dec8426eb038fe40be75079ce35894b1a8e0d1d815261150c
-
Filesize
512B
MD5b9ef77efd8176d2c9222c5bc3d7b01d3
SHA14d407cfd20ed74f9bb0674f63f3a6b289066f6d9
SHA2562c25d5e20ccd9f4c03b6b98949640a3feb927f9cf851471e97ca1782f7ae03bf
SHA512cac1a446cc246149720f821bd418679970027cd46d37ec80ad86acd72d2df6e2baf47294a74cc41b9594dfd82a202d4f817b8e484bea0a27d360f65be7c3911a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
72KB
MD5849e0a7d2868e2f9720deff50a970c83
SHA15d90d5654c0f706f7cdd32d09496590968c0602e
SHA256069f41199cbdd61f5c4d120f245786bdbfddd62add9cf7ead5ef59165b0721af
SHA512d7e1efa1570043ff3e4c32f7713e60318485764ed9697087de3cd548466db5fbd5e315a2c7cb0b09d61c3d57d7cbc9757f5913264b1d0737861856d7424e0ba1
-
Filesize
4KB
MD5c01ba66dc039163d2a328a4e9f4721aa
SHA1ba73c845e7f458afc70c1f60e103861cb872d5b0
SHA256228ede91453ba5f964c67248ba201facfbd5133045b336d29c33417403682367
SHA512c2e19155e54beb2a9c33928c72c801bad8686affc296668fd88ee02999bec78e323aad1f17868876098de04fe4f86b9cbcdddf55a2ee030e03830f86cf390476
-
Filesize
92KB
MD5fde2b12cb920d4fc9493f2b4bee23fa9
SHA1574e0947a0082e3648c8d9b7f7e39a7608b5c7fe
SHA25647c1add4f848f73070c9b6332e337d574a718456f37332ab83233c91201c2bd6
SHA512208ec3924c6ce464417b65bb32a7471d748f88ee31830eb6100df279cfb03861fe0d465a49159849d41b088e7f80b1b06b0dcccfc5facde445fb772812bf8ddf
-
Filesize
52KB
MD531fabc658ae201f255678d1c8a54247a
SHA1e66e6ff0a405cee037924044eeaffd89fa537223
SHA2569bc35fe8e699481c5bbc79a772d7fccf152409591124d4cb5cac99bf4209c1c5
SHA512dab067ccc19ec87764e27269483ea564c8268becd0cf11537c9d8a71bc726af925ec69423e52c2f4796f8e439c8b02e157ed7974545aadfc989b6f2424b2dc7a
-
Filesize
40KB
MD5489f93a8ec4fea674e1f87527dbc150f
SHA1f502e48b8db1e194e687b9af7b824ad40768e883
SHA256ba04dbe2c1829727e5dd7a96ca91c6d677461403fd56914094037dbe48d12f22
SHA512848aaee70ccb9967bf7ed3e4a3eaf01b90c91fb629aa9e1238f44abc42e7fe6e16bccbfa044da830c2e4ae1d8990111417931f0d7e80ebdb38b190eef0b4ba0f
-
Filesize
4KB
MD5251b328a5bc852324c7c956db5b923bb
SHA174608f4873b83fb7656fafebcb19d31690f36cb7
SHA256cbc1f4a2e2ed1c4120d47ea33616daee8f986800fd4848b9a382013ba4f006c9
SHA512d748f0a2dfe00f658ee8ea5697994f25bcd37ff064115c7ff94444382d8fde40435c6622ac88b386bf799df9760d24d5ebbc399dd573af18fa8fabcca5ddeef4
-
Filesize
603B
MD5d944317d9ff060463a1d3312f66fa4d3
SHA1a6bdfb973255ec08e6c9b5707ed413c5ffd4c199
SHA2568fa189a81e6682b72b13232e7f4007523951339695521f8c6aba2f7f4e790e21
SHA5127713dc8024fa1b8899da84f36a62b4d90859809950ea2b58ff76b6dd6ae73b6f89b26e0e4c6121e5d62bd1b7b6181b4f1b705a4ab9367c3b865c25853fd58e7b
-
Filesize
310B
MD5b9e332e208a3ad487c86cd35c02f60af
SHA12caf281bacf142f0f8901d047f124214b7cedc49
SHA256c765a739574ea4b08f42b0f3a1905007a69d21332757cb9e9c8a1920a901b168
SHA512f217ceba11fe4029e260f68ea57fe059d7d7a6d50fd4e1a01e1edcca4ceac8fd9e8cdaa19f7daa2d284f44e6b5246adb34e198f13afade0be9a030cc1ee7a4b5