Analysis
-
max time kernel
6s -
max time network
175s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
22-05-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
65d021050bba08457209744235737fe2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65d021050bba08457209744235737fe2_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
65d021050bba08457209744235737fe2_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
65d021050bba08457209744235737fe2_JaffaCakes118.apk
-
Size
5.9MB
-
MD5
65d021050bba08457209744235737fe2
-
SHA1
901e71564a29a26535bc4d3d64878a1aff859acb
-
SHA256
68d02913ac4620747825bf163dee15bd13eecb0cd4d2ecf433f54fa2028de4f3
-
SHA512
824eaecff70c7aec1ec76f50063553c1c67e154ea4706b1f2f48c2aed1fead267903feb5924e4a98d3606406d9ddab9d970de421a520ec9f597b260c27e020e9
-
SSDEEP
98304:B/TEwjGru+008VhEPUF433Sf/pk9Q4BfuwBfDgey/9hue02NKt7IJ5PtWiPtfW:B/wiGaZDoUa3c/pkW4puwhgpY2NKiJte
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.zteam.doubletap.new2019description ioc process File opened for read /proc/cpuinfo com.zteam.doubletap.new2019 -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.zteam.doubletap.new2019description ioc process File opened for read /proc/meminfo com.zteam.doubletap.new2019 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.zteam.doubletap.new2019description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.zteam.doubletap.new2019 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.zteam.doubletap.new2019description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.zteam.doubletap.new2019 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.zteam.doubletap.new2019description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.zteam.doubletap.new2019 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.zteam.doubletap.new2019description ioc process Framework service call android.app.IActivityManager.registerReceiver com.zteam.doubletap.new2019 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.zteam.doubletap.new2019description ioc process Framework API call javax.crypto.Cipher.doFinal com.zteam.doubletap.new2019
Processes
-
com.zteam.doubletap.new20191⤵
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5126
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD532d248bda123b21ec3f08c65c9ce4001
SHA124926078a13f52a47560237a20113fd947f41b25
SHA256e1e5e80ed10357cab2e8573895c28c5877d5eec09cb4535637b2fd2263f44dea
SHA51296ceea44a16c2d3395d07e26a5f822f6dfd149b8634665f75b8c3767d02d5c3c273b5fa10b970f6371d0fd9c65e97fc77a4f593fbb1d28e2000b75dddbf23142