Analysis
-
max time kernel
149s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
04/11/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
8e5237a5fb68f92e9b6e0d37c172e4e2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8e5237a5fb68f92e9b6e0d37c172e4e2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8e5237a5fb68f92e9b6e0d37c172e4e2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8e5237a5fb68f92e9b6e0d37c172e4e2_JaffaCakes118.apk
-
Size
2.8MB
-
MD5
8e5237a5fb68f92e9b6e0d37c172e4e2
-
SHA1
bb7eeadac560a80ad0dfdfca61649b01861f323a
-
SHA256
59abde0b18235002444e4cfddbabcc2fb948f9a2618edec896f8de4f58647cde
-
SHA512
1998b77026a50cc9737822d91f5716e2af8952b7b785ea213b4cdd5828dac5016410214ed8107ccaacdae17c828c996a15ac62f9398091acbdacda824dda89f7
-
SSDEEP
49152:YpsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZly:YpMtAZmEPGD7xl1cqhXF6AKv33rAQNQR
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ezzebd.androidassistant Framework service call android.app.IActivityManager.getRunningAppProcesses com.ezzebd.androidassistant:beyondAppMonitor -
Queries information about active data network 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ezzebd.androidassistant Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ezzebd.androidassistant:beyondAppMonitor -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ezzebd.androidassistant:beyondAppMonitor -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ezzebd.androidassistant Framework service call android.app.IActivityManager.registerReceiver com.ezzebd.androidassistant:beyondAppMonitor -
Checks memory information 2 TTPs 2 IoCs
description ioc Process File opened for read /proc/meminfo com.ezzebd.androidassistant File opened for read /proc/meminfo com.ezzebd.androidassistant:beyondAppMonitor
Processes
-
com.ezzebd.androidassistant1⤵
- Queries information about running processes on the device
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks memory information
PID:4247
-
com.ezzebd.androidassistant:beyondAppMonitor1⤵
- Queries information about running processes on the device
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks memory information
PID:4294 -
sh2⤵PID:4404
-
toolbox ps -p -P -x -c3⤵PID:4431
-
-
-
sh2⤵PID:4492
-
toolbox ps -p -P -x -c3⤵PID:4511
-
-
-
sh2⤵PID:4552
-
toolbox ps -p -P -x -c3⤵PID:4570
-
-
-
sh2⤵PID:4617
-
toolbox ps -p -P -x -c3⤵PID:4636
-
-
-
sh2⤵PID:4661
-
toolbox ps -p -P -x -c3⤵PID:4680
-
-
-
sh2⤵PID:4714
-
toolbox ps -p -P -x -c3⤵PID:4733
-
-
-
sh2⤵PID:4761
-
toolbox ps -p -P -x -c3⤵PID:4779
-
-
-
sh2⤵PID:4817
-
toolbox ps -p -P -x -c3⤵PID:4835
-
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bf40ccfabca55d527d016a46c8673293
SHA10fad4060076bf1eb7681648cba11b20db43eda07
SHA256d9970819ec5368729df3f57956f52f18ecb1f9605792db2e27059b7605c631b9
SHA5124b4ee6bd2eefd4ee4402f9e1041bf42c4faba211bd05d00f893c242749ff76e4d49bdf4ed0955c1072a15d8e083c469108f6b39d3c04ca2e6d95b4a8eb2b2ff1
-
Filesize
2KB
MD574811982de9fdffde45b219b4e5c3528
SHA1a240bd6e3b36788e8631add89495e14cf3f10020
SHA256144e8b4f4e62f34fbddc2931d11e571580eb9ffda0711242f0555fb6bff17fcc
SHA512de14af62bc02862561022776f711e30dfa16264a868fc2d8a28e6ee33b93ccd503a55c95d664867a97a10b7c10639628e86d598e7b58cd73ac4af27f8adaf457
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
32KB
MD5faacaf6c6af3d7e5be082ab19d10fede
SHA160c38d41522c20a75ddf2ade8e88714905d0fb10
SHA256b0d04e448bed1902cdd143bfcdd0614a96382e469b2b102a2c3a7b023a19a5e6
SHA5126a843f17a08afab4fba69222eeb7855ad0d4d30946bf4b109b67f4e4a3db34236dda864f5439b91c0153612fc25ef3718c29f200cfd78e028bc7761f96925186