Analysis
-
max time kernel
149s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02-11-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
870697ddb36a8f205478c2338d7e6bc7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
870697ddb36a8f205478c2338d7e6bc7_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
870697ddb36a8f205478c2338d7e6bc7_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
870697ddb36a8f205478c2338d7e6bc7_JaffaCakes118.apk
-
Size
389KB
-
MD5
870697ddb36a8f205478c2338d7e6bc7
-
SHA1
bc4256e54231346d305afb00f02d609fcd128c37
-
SHA256
5022495104c280286e65184e3164f3f248356d065ad76acef48ee2ce244ffdc8
-
SHA512
1ea11ae876b4191ea59222a6dd3ea1c53f62b9cd82331c63c563e2ef7ef534f3dc2c238d69ad0d4466d7ab3d480352ed1b28e8be0ede7edb3b14bb620455b7b5
-
SSDEEP
12288:Vjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4Sge:Vjnb8aXzG38wP5x43e
Malware Config
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule /data/data/ufD.wyjyx.vahvh/files/dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Xloader_apk family
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
ufD.wyjyx.vahvhioc process /system/bin/su ufD.wyjyx.vahvh /system/xbin/su ufD.wyjyx.vahvh /sbin/su ufD.wyjyx.vahvh -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
ufD.wyjyx.vahvhioc pid process /data/user/0/ufD.wyjyx.vahvh/files/dex 4214 ufD.wyjyx.vahvh /data/user/0/ufD.wyjyx.vahvh/files/dex 4214 ufD.wyjyx.vahvh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
ufD.wyjyx.vahvhdescription ioc process URI accessed for read content://mms/ ufD.wyjyx.vahvh -
Acquires the wake lock 1 IoCs
Processes:
ufD.wyjyx.vahvhdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock ufD.wyjyx.vahvh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
ufD.wyjyx.vahvhdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground ufD.wyjyx.vahvh -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
ufD.wyjyx.vahvhdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ufD.wyjyx.vahvh -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
ufD.wyjyx.vahvhdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS ufD.wyjyx.vahvh -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
ufD.wyjyx.vahvhdescription ioc process Framework service call android.app.IActivityManager.registerReceiver ufD.wyjyx.vahvh
Processes
-
ufD.wyjyx.vahvh1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4214 -
ping -c 42⤵PID:4387
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682KB
MD5e2b557721902bc97382d268f1785e085
SHA1fd5d2a66cb25e46aeafa4f922c104847c75c82db
SHA256231931c424611b6d93ba9548a8f0ce137ccab6f6ea6a548f33a1ad6ed75a9638
SHA5120d7932d022013acd8077cc15319ea87fea30b972945734cd564e70469b1ccca0bf8196ba8192a35b1ceb6f5d676e84c250e6cb2cf465bd7701b05b8ecdf90a6d