Analysis
-
max time kernel
145s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-11-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
-
Size
1.2MB
-
MD5
b11e7e40d2d41fd73dfe8bf4a4b640a2
-
SHA1
e666f0f5b4bc28fac6d2deb5c982036961696440
-
SHA256
e8671256db652571063e3d8a6e5df6645e0e4d77ed34454b0fbba65092d59bb9
-
SHA512
347da43684172cbae355c17b54c5eb8612a38a7b58add512ae347de77b7fb6492823da0f2638a065549c9b538f12e157b4d6e4e2bf2bd43ad7426101b2dcaecf
-
SSDEEP
24576:pNVdDF4EmyjWs8o9/yxNEZ/k9PKe18Ap+YhQ2ry+e12pBA2SmX5rmRtJx:pjQOKoMxNEZspK48BnxAf5rmRtP
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
toufa.sji.hxzioc pid Process /data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar 4964 toufa.sji.hxz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener toufa.sji.hxz -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults toufa.sji.hxz -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation toufa.sji.hxz -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo toufa.sji.hxz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo toufa.sji.hxz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone toufa.sji.hxz -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver toufa.sji.hxz -
Checks CPU information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/cpuinfo toufa.sji.hxz -
Checks memory information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/meminfo toufa.sji.hxz
Processes
-
toufa.sji.hxz1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4964
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD52ad9fb4b2d9b333883b7e38f61c2fd2f
SHA15b85041452d173ed0d81d25b9ca78608a998e328
SHA256b9310a99f1b60959f6b725eea74623dc491adec55da740c17e8c7e02f35818f5
SHA5126fc04e1e22ebf8920b4928a8086cf3e0814d155f79f80d71622916f6a0911262382710e5ee2acea653db4b387730e201134592cb9992b14f3aef8b09d83bda90
-
Filesize
382B
MD524b5fd3425a505204cfbb180313bf42d
SHA1e49ca78fc57d3925dc17f86824e3171452082690
SHA25671330c4225bc6ebc2823bec934aa99140b52132f0b77f9cc66302ea3b0fafb30
SHA512a59bbd41551a3dacb7147f6a485adc2b09a634376fbb9f8a25d3c2b0f6209547ed9fdce603deef48443353c0eb7be26bbe09254d3495b14279e3195c474d2d9f
-
Filesize
231KB
MD5c601107d24f96646ae86f74b0fea880c
SHA18a8ce84fe5b6e186ddcd69c8757de4fb1aae7ed1
SHA256939120d702d97dc47c6963d98dc1d2694e0fae5f5d5199c0755f54741a3c2a16
SHA512b573a0d74ea8c6e99c3ebad4ac7b42ce46940231f8a90c9b19c887c6c20356235241068d187aab2bae9914c3df84cbe80bca13b5b6d070247353f5e5eb282f33