Analysis
-
max time kernel
179s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21/05/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
62be1a48220023e087048f914c52a431_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
62be1a48220023e087048f914c52a431_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
62be1a48220023e087048f914c52a431_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
62be1a48220023e087048f914c52a431_JaffaCakes118.apk
-
Size
9.8MB
-
MD5
62be1a48220023e087048f914c52a431
-
SHA1
54b03a053b659a248782598a4248339be88eb45c
-
SHA256
10e046aebf5edc55dc6b1268f82ff0d302634dc259fa61fdcb81f88cd270cf8c
-
SHA512
eb095c8e5d2c32616193fafd58469d7d1ea8f5e4b97b409c6cebfaa7a8dcaf2788a38351366521143ef047e74997f984590babdac720497b18396dc8667c76dc
-
SSDEEP
196608:5fdBEil2/uwZNQ2m1cmmSQznvcktKBkH0GvsjGnTM72wiN:9dz22wrmRmSOn1IQznTW2jN
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo net.kairosoft.android.pirate_en -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo net.kairosoft.android.pirate_en -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.kairosoft.android.pirate_en -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo net.kairosoft.android.pirate_en -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone net.kairosoft.android.pirate_en -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo net.kairosoft.android.pirate_en -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD531e376878275f8b2d7e8d00b2d574859
SHA1db2ee8001adf008d832e2d059d93dada12ac15f0
SHA25678a02294169a2eb97e1d654c9cce1b547824674ff9b3abdb8b9f3993556e042e
SHA512ca095f2a8d710ce877eca0fee94928ba02508d880d90b934fea67bea57e67e3c5e8cd7e1bb8b623971376ea0a14645e258461a8d2f78174618185292101aa4f1
-
Filesize
64KB
MD5e41bc57d4e09a1a84d6a194a671ae7c3
SHA183ec712798437df10a3daaef541a1a46164e5222
SHA256a844c9dcb724bd8ef7ac34dfd9e8759d7e102b68756b3911214adeec1db6b2ff
SHA5122c5adb469c6161da9aa55f90991159ceb7090f4ddc2d7f0bf3f88d1b76496186197d03bf70854449c7b7eb21500082f139c523d389a5fa4d55c2fc72940c651b
-
Filesize
16KB
MD531f9eba907f9bf691feb6e27a4b283a2
SHA16cc1628671f08d5de88e5b2ee85f6e3026eaa1d7
SHA25689f1da13ae1cad9fa50ee446a29b5aa6961cb41fd21b983c4848e98a8587b6b8
SHA5122f765efb7b89df1be3cb5e1f24c1ced6b8ff1bf5b69758483908507ce44d46bceafa56e4bf7253c42d986c2b2556b4e1f59ca9f6ebcb488fa7dc1c5c9e3cb258
-
Filesize
7KB
MD58ab4960800f0b9960ddced240eda0db8
SHA15f82d0e09d4235ba67c25212852cfea07f436e20
SHA256ad5975fe5390178eecaa2596ab4b4e84a3ecf488e8c3ae504cc5bb9e9ae84f18
SHA512a1c647574fd870e8bc78bb5aa3b49af0c61887a27d57860dec74b4c1eaa58f769bbcfff20629b061d3754d1a8b19b58a7dd50d566cf153236806176a973e1721
-
/data/user/0/net.kairosoft.android.pirate_en/files/Tapjoy/Cache/305e92b552f0b149f572e401c5e9b4fb1d1c5bbf57888f31b39e47b04b42e92b
Filesize3KB
MD55de4c723cd74e72aab3768c822b59f6e
SHA16bcf0e7641be9d5f6a9a360239ea17180c5c24c4
SHA256634117884ad6e001da18755836bfb8a3ab8140a00d8e8e8a5ff401fb8fe31a4d
SHA512f3d074e6fba27f33522f58efbdcc07ab5b01ef3c7f86ad62ed4fb15a25441e8b915f9a5160713c01ed4fba74dafbaf0523f2a172a54e5fd8e8008f3799b426cf
-
/data/user/0/net.kairosoft.android.pirate_en/files/Tapjoy/Cache/72cc2ce4c849a74a571306657b38154530fc013c5619d2756cb44006b71281df
Filesize23KB
MD5cebd2eac9e5d22dde187020b1456ba55
SHA1080d9bf7be8dcd1d0be2db35b9f377313e2ca64b
SHA256d65370d78e962ec8db098b0209f1de275bc20df21e4889a5ace5c818968c4091
SHA5123b90a1944af8cbd4f15b2f2c8963e69e3353b47a0ad1205ca79bbf630efd2a66f9e1fd66a3a862bbedc997af3ed29cfd9dde4eb6d2056aa074e24854542a9432
-
/data/user/0/net.kairosoft.android.pirate_en/files/Tapjoy/Cache/fe34bfffbcd29b1755f133c19aaf4621aef426e082ee6ff530f12b91de36a0bf
Filesize49KB
MD5ef998efc9d10eef6fcd3d5dd8149c84c
SHA11c5089ba85c24230fea9b646e7c860354f71a03d
SHA256a84b4119c5ae21da53194e5dea2ee3f9bb12e51da81dcf8f1823305603262ee4
SHA512d3c937fc1aa8490d5348a73efaab7d28f1af4e20b3e43189364344efbf6abc2e2d6ed6dd03116d014ce94346265e6c293e01545bf246d57d8ea477aac47ec3e4