Analysis

  • max time kernel
    178s
  • max time network
    181s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    02-07-2024 05:26

General

  • Target

    1e23a853a7d8694fd4d7d5b752a5f200_JaffaCakes118.apk

  • Size

    276KB

  • MD5

    1e23a853a7d8694fd4d7d5b752a5f200

  • SHA1

    b9fda9610f6b11616d7834a7f6a28447a603c8a2

  • SHA256

    f25766c3780d9b757a02e44678eec92aaa9e19f1b49980472ad3cd2a7fda87e6

  • SHA512

    243d555623ba5b4ccd3f4bd00450ed25adf7e5c2c14f79408112819e40bc4efae711fec9bbc2c9514452841cd5a93b356934a3933c144a08a61c47ff3675e954

  • SSDEEP

    6144:WiuKlMUzrxVBLc1YAlaXUI/igAdgzey7FDNaw4IzEsS/ZXBc2UA5fN4:duYMs7ucdigAdgRlNa/IvcRgE4

Malware Config

Signatures

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 2 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.lima.iiuvk.sprylqiq
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Queries information about active data network
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks memory information
    PID:4495
  • com.lima.iiuvk.sprylqiq:RemoteProcess
    1⤵
      PID:4547
    • com.lima.iiuvk.sprylqiq:guard
      1⤵
      • Schedules tasks to execute at a specified time
      PID:4881

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/user/0/com.lima.iiuvk.sprylqiq/app_tfile/fields.jar
      Filesize

      151KB

      MD5

      07f164db880c1b6691b5c54862e9a3c4

      SHA1

      6dd9102eff0b0134fb9bbafd0122bfae719565fd

      SHA256

      2e6db810857d45da5ea6f084812401401f0f7a2bd6e7c3a7a96c7d46995551fe

      SHA512

      46bec2510d5ed27d54248f32556d2b7969d0e2557f17fe2f1f6f18177e2dbfc42598cfe555d44b38a2bc2480212aec036f4a4df392ca39dafe09a830b03f93f9

    • /data/user/0/com.lima.iiuvk.sprylqiq/app_tfile/fields.jar
      Filesize

      306KB

      MD5

      35926f0158766813027fbfe1ab5b1125

      SHA1

      8f166af95ff940dc45b933462ee7ffdf30dd5d06

      SHA256

      47a1ed442aa97ce2a6c313cbd64547cd506b809593745707d3fc9585f6a6c3f4

      SHA512

      b0fb1d19eedb27b3efda5354ac947db9ec89901d0f5c5b9a64325f2d74f4e11f5330f984bb9a9e5ad1c2d3abcd62e1516d94e7778d273ed5df51993dc9573ba3

    • /data/user/0/com.lima.iiuvk.sprylqiq/databases/tbcom.lima.iiuvk.sprylqiq
      Filesize

      36KB

      MD5

      ebfd4869bb86abd638bc48b891f3e1c8

      SHA1

      a27f262fe7a41ec9976d457416447f8b78c80e03

      SHA256

      5f49bca53de766023101cc1ac8dda79a83c485fce8d9138452b39d1853d2fe0f

      SHA512

      062fd15e0a34619071834f2d81889e6a100c3a707e53621b16d584182a57c690f6a24a73e19fb77678d857fde477935811a963998a73d7ffe971d6ebd9cafb07

    • /data/user/0/com.lima.iiuvk.sprylqiq/databases/tbcom.lima.iiuvk.sprylqiq-journal
      Filesize

      512B

      MD5

      34b17dc8abfc089bf267a78df50984a2

      SHA1

      67e17e720a654d6c9f72515b34878e88734c092b

      SHA256

      04832978c1d185759226cd6c1790674dfb4f25d397f053c141ca5375c5a994d1

      SHA512

      b49040878179468966fa328684addd713813eaa2e24271e01eea9d2552425026b91bcf47025a9e016df1b073fcb42a79bd1b90a15534c5d9550004f46ef92cc2

    • /data/user/0/com.lima.iiuvk.sprylqiq/databases/tbcom.lima.iiuvk.sprylqiq-journal
      Filesize

      8KB

      MD5

      988efd1b14b3baa1ef37a26847b743a2

      SHA1

      05ce4abd86c90cb78ae1e3ac2024d1d1b570af96

      SHA256

      aaf8c577d86ebe66154c7cb263c2da6994a36ba2b524646fedbad4072d028d65

      SHA512

      1962a571b16ad1f4fc96c42729c6e708756a7daa6d4e0bc2049423c1f5745af95ab3441f928d90b42a4ae6f21713629bdf534758b15be49f8aa7961dd2bbb319

    • /data/user/0/com.lima.iiuvk.sprylqiq/databases/tbcom.lima.iiuvk.sprylqiq-journal
      Filesize

      8KB

      MD5

      cdb6eafcc065b2ff6e1e1330c671ef0c

      SHA1

      d10def69c20a081b338f3df229e863d0fe835d29

      SHA256

      d7b3aa3ffb63440d0c90ec74cf154ec74a7da1f38e3016a5569fcea2de0bb6d8

      SHA512

      8c12788696fff4f3b2c26bc65c528f5a2582c2afe1e457bbafc670258fc04743907fd46a35cf23b7e63576714129faa1002e571a5ed3b505dc12db46c8bc3a56

    • /storage/emulated/0/Download/sdsid
      Filesize

      4B

      MD5

      b8c37e33defde51cf91e1e03e51657da

      SHA1

      dd01903921ea24941c26a48f2cec24e0bb0e8cc7

      SHA256

      fe675fe7aaee830b6fed09b64e034f84dcbdaeb429d9cccd4ebb90e15af8dd71

      SHA512

      e3d0e2ef3cab0dab2c12f297e3bc618f6b976aced29b3a301828c6f9f1e1aabbe6dab06e1f899c9c2ae2ca86caa330115218817f4ce36d333733cb2b4c7afde7