Analysis
-
max time kernel
156s -
max time network
152s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
22-05-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
65ad0375ec7c1b75a36242b2872a3d34_JaffaCakes118.apk
-
Size
627KB
-
MD5
65ad0375ec7c1b75a36242b2872a3d34
-
SHA1
4aa6f48bc710488f8b9dc0e080e2d6b13b2cf485
-
SHA256
44afce93020bdd8f3ba3e0c62a654447371b9e84de8e019832e09df901930b86
-
SHA512
2d248a90ddadebaaea49cea924735ba12e7a3a8a8553d45d6b604e4c1f8564fadfc64c43858177548a67570b1ad0e658f407d08e000507b9eca0f7ccb9873b46
-
SSDEEP
12288:/6LB0DwAV8T5rjQy1o2Ngp5v4VMQxDAFjonGVsaH80fUTYY6/:imwn5Do2N45AvDAFjQGPfUTg/
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.lurensoft.audiordescription ioc process File opened for read /proc/cpuinfo com.lurensoft.audior -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.lurensoft.audiordescription ioc process File opened for read /proc/meminfo com.lurensoft.audior -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.lurensoft.audiorioc pid process /data/user/0/com.lurensoft.audior/files/__pasys_remote_banner.jar 5115 com.lurensoft.audior -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.lurensoft.audiordescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.lurensoft.audior -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.lurensoft.audiordescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.lurensoft.audior -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.lurensoft.audiordescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.lurensoft.audior -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.lurensoft.audiordescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.lurensoft.audior
Processes
-
com.lurensoft.audior1⤵
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:5115
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5289aa52188b4a1eb9a3a5904b0638ada
SHA13efe010f8832bc5ee7df88152e01ef1f446663c4
SHA256947be2e29c43127ccaa6ab05b2600405cebd5aef985204a4cf2e17ecf7cfaa91
SHA51234078ccf3fc42c63f338bb9f62eb139d953ad9e0e5fd813465d9f4d37f708fc20d7309897919cdf6be37acbda2669fd6d32ff4a233279e2cd6e2a0ba62cdc47d
-
Filesize
417KB
MD596d208e818748da0a0510994de5be961
SHA18f093544c3ce04ef1dc323730d2937f889c911c6
SHA2569fab83f42fe2573d80524e4b91caffaee37f2ca37f56f6a97a2c626fb7927215
SHA51255a2b0c3a86ed751f31f96774aadebcf9068a4c3b828f0e1f4e30f0a5acd7a66ef14df7361ad2d9cccfe8f560db8e8cb2c67d9a459a75d24fbf762528f32bbf8