Analysis
-
max time kernel
8s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
30-04-2024 17:40
Behavioral task
behavioral1
Sample
0a3cea43e9df989f3ba5a6942eabf6c0_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0a3cea43e9df989f3ba5a6942eabf6c0_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
0a3cea43e9df989f3ba5a6942eabf6c0_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
0a3cea43e9df989f3ba5a6942eabf6c0_JaffaCakes118.apk
-
Size
1.9MB
-
MD5
0a3cea43e9df989f3ba5a6942eabf6c0
-
SHA1
d1986f187898aed67fd3e123910dc62cf744564f
-
SHA256
5c260b9e5fef51d2686ed191c1a30192b7d5ca4e4ea20827dd308c0c74490568
-
SHA512
06196e4fb26f31876d20676ea78078a4ff29474074a6a09dd61bebcd969b27a1c9ed193bb6072532358f3f19f71fa31217de34ddb507b7dd0412cfe5df4c2f0d
-
SSDEEP
49152:5xGvnMRrldd8F0MMNVOkfijNOalwjheMRmCpbHlLSyR93b5j1:nGf2Z8F0M+dfcNOhnmybHlLL3bZ1
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
video233.sex.movie.fshdescription ioc Process File opened for read /proc/cpuinfo video233.sex.movie.fsh -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
video233.sex.movie.fshdescription ioc Process File opened for read /proc/meminfo video233.sex.movie.fsh -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
video233.sex.movie.fshdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener video233.sex.movie.fsh -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
video233.sex.movie.fshdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone video233.sex.movie.fsh -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
video233.sex.movie.fshdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver video233.sex.movie.fsh
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
Filesize
5B
MD5f8320b26d30ab433c5a54546d21f414c
SHA197cdbdc7feff827efb082a6b6dd2727237cd49fd
SHA25660a33e6cf5151f2d52eddae9685cfa270426aa89d8dbc7dfb854606f1d1a40fe
SHA512af1aace54ec0ab736f8a6a262cc319740beb89d04efe071d451522e2cdb210bf0c81ae676ebc45781935cc18a3b939a6645b2ebe0a484e2594d672d81460b3dd