Analysis

  • max time kernel
    125s
  • max time network
    162s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    30-04-2024 17:40

General

  • Target

    0a3cea43e9df989f3ba5a6942eabf6c0_JaffaCakes118.apk

  • Size

    1.9MB

  • MD5

    0a3cea43e9df989f3ba5a6942eabf6c0

  • SHA1

    d1986f187898aed67fd3e123910dc62cf744564f

  • SHA256

    5c260b9e5fef51d2686ed191c1a30192b7d5ca4e4ea20827dd308c0c74490568

  • SHA512

    06196e4fb26f31876d20676ea78078a4ff29474074a6a09dd61bebcd969b27a1c9ed193bb6072532358f3f19f71fa31217de34ddb507b7dd0412cfe5df4c2f0d

  • SSDEEP

    49152:5xGvnMRrldd8F0MMNVOkfijNOalwjheMRmCpbHlLSyR93b5j1:nGf2Z8F0M+dfcNOhnmybHlLL3bZ1

Malware Config

Signatures

Processes

  • video233.sex.movie.fsh
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4401

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/video233.sex.movie.fsh/cache/~test.test

    Filesize

    4B

    MD5

    098f6bcd4621d373cade4e832627b4f6

    SHA1

    a94a8fe5ccb19ba61c4c0873d391e987982fbbd3

    SHA256

    9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08

    SHA512

    ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff

  • /data/user/0/video233.sex.movie.fsh/files/BanClicked.txt

    Filesize

    5B

    MD5

    f8320b26d30ab433c5a54546d21f414c

    SHA1

    97cdbdc7feff827efb082a6b6dd2727237cd49fd

    SHA256

    60a33e6cf5151f2d52eddae9685cfa270426aa89d8dbc7dfb854606f1d1a40fe

    SHA512

    af1aace54ec0ab736f8a6a262cc319740beb89d04efe071d451522e2cdb210bf0c81ae676ebc45781935cc18a3b939a6645b2ebe0a484e2594d672d81460b3dd