Analysis
-
max time kernel
105s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
03/11/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
8cbfc9764ebe88e450183b6c89c1ba06_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
General
-
Target
8cbfc9764ebe88e450183b6c89c1ba06_JaffaCakes118.apk
-
Size
6.1MB
-
MD5
8cbfc9764ebe88e450183b6c89c1ba06
-
SHA1
0c5b2d9536bba3634e4a45e46dbf8077ef833dbd
-
SHA256
cfcfe43bd9b3958d360dd3e49bfa7938bc25d2ea5f73d86d5a1e6cce6f3d040d
-
SHA512
96bdbcb68032d06ca242e1ca4bec2c5eeb9d361ed35f678996e251bc64a785eeb90ae22f589e49048569c56437a0ff54735c6e4618306b29c790a4302ba90ce0
-
SSDEEP
98304:Hgq7YoUhbUofs+jSriRY5/BtSI721RKmgyq+3njm2vNYRMcBdHMoW8TccuQYPob:HgRNh11Y/2k2/qoS2vAfBOofFcob
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mdsd.game.zf.airplane -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.mdsd.game.zf.airplane -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 7 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mdsd.game.zf.airplane -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mdsd.game.zf.airplane -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mdsd.game.zf.airplane
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e5c6d875366a9026c915627ba8d2662d
SHA145a3277485085d7ebc02d586b25e7d4d125836f2
SHA256dbdb4c7514850c7e120445eddeacd582cedb2edca88be9f132a41ce43d416d60
SHA512151d02db407e5a2b7a87feb1a3863d0c81cbba232a0bec5a586470b79b99ba970d9915521fbdb9a0ed787fe6db13133ae5622585f0e555d39363537c5ea25488
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
136KB
MD54bdccac1b37d6a8e21f0fb05709e347a
SHA1dfa8a00e303391f3f1dce025ca49f2e117fdece0
SHA25604a917d56328a15c466f7cf8f119157f4774149ee19f5ea2145f1b4e39a61519
SHA5123979cc64051148a8295494055ae05e14d7a12be06fabc8bd37985d0cc97bde3c753c929b39c068a49c7a939e940b6ea0f5fd38c07341593990c4a1f1daf6b72a
-
Filesize
197B
MD5aafa4ceabc7256285a4a1fb1c57eb302
SHA17f161a0c621630275231ca2fb84f8f85d23e5a40
SHA2565da00382c9dc56e64fe4f08c0cea7189f7638b8752396475193a4678a6369158
SHA512cd3ef8a2d47d613a8adde9d1791d573e4777f7efead5b2714673499601bdd2d61e8c4a067c0d6698126e4ef156eb9d921623675093f5f1d50e4083a9855ce574
-
Filesize
134B
MD56cd96547242a37638157b8ba3cb831c3
SHA1d5b6970d08e73b422e051216527f7748a3e339fe
SHA2569fd507fbb56af29aa116d70f5ced3c52e909e22a00aab5daa74363b37ba69493
SHA512c0bbe5834ff7ce76307e77ea4e78165bcc258585c0d4e4ac515b9b3615a8138c8098e60a7e513901952418ba04c3ce7c5b8ff689b68439521544a97124c3025d
-
Filesize
134B
MD501bbeb379cbc6920f264a7c397f9cb2f
SHA1562499454ca0e830139cde4049d89144439b701a
SHA256748e1c9ab551f615bf84cc5d06f5484cc7cede51ab3480d176cfd840b380683e
SHA512f1f206764ea4cb91a6fcaaadbbeace0fe05ac213c6f832076da364644e6ef2c18afdd57865975d7faad001ac428d6ec1697a5760ee3795b21ad507044931b65c
-
Filesize
134B
MD5bd7daadf93ba36f97c88c3265fe343b5
SHA12f70c7d61fea794d1a3de76f925c44b136ee5b58
SHA256c2ad05970d787ca8a15bc338761c2c531778fdbc3d6454b3019fcb71e9fea674
SHA512f1603d9856aacf8ab462c40484de68e1e6b1f7d765b2130d3e2ae9865b2dc657722bd14746048cc3ce8f8348ceb8b9e4808416bdcd0370ca1e83b4549b61e4b2