Analysis
-
max time kernel
51s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
22-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
67216a2e4efc19d2f9330deb1d59333d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67216a2e4efc19d2f9330deb1d59333d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
67216a2e4efc19d2f9330deb1d59333d_JaffaCakes118.apk
-
Size
6.1MB
-
MD5
67216a2e4efc19d2f9330deb1d59333d
-
SHA1
7420ec8977a54e292881e90c8460e1a526e538a1
-
SHA256
e1dddaa9afca116ad8e69e22e4cc4bcccc339dfe44a571073c29a7b4f8ff89dd
-
SHA512
6c36a1172faf9767b8e50256adfa8f5caff2b909789eda7024544f77b4411b05ccb203a66c15cf5f295a84e3c3ab3fdaa1a8d0ae686c67119030c417e097a9e7
-
SSDEEP
196608:QGegghMH+yXAWJLTe3M1Hz2/9KUtAaxdAHJw:QhhMH+yvjHz2/9ptaHJw
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Reads the content of the SMS messages. 1 TTPs 1 IoCs
Processes:
offersss.prime.my.jio4g_primedescription ioc process URI accessed for read content://sms/ offersss.prime.my.jio4g_prime