Analysis
-
max time kernel
179s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
22-05-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
-
Size
600KB
-
MD5
679f92481a5fd52740f69c7639a4311f
-
SHA1
5e07cb8a16ea233ee617897ef710f799f3a4fcd5
-
SHA256
9e14bedc5f5a619ffd5ed95eb98312384ac0da2667bacbf3daeea5f359b67212
-
SHA512
8b01161d2761f7a39af2254e72d37a8ac48ae88398dfaec6d9013d556a4fba84968f86170ee9001661b15c220ec9534905f5eff91acf9db703976062f2a3b394
-
SSDEEP
12288:uEQxhv+5dElRinRQomdi3p/QTaRHa0fiadICelXXzua9i:uVRC2inRQfuQTIHa0fiAbelzuaU
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
Processes:
com.tk.tmoviedescription ioc process URI accessed for read content://sms/inbox com.tk.tmovie -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
Processes:
com.tk.tmoviedescription ioc process URI accessed for read content://sms/ com.tk.tmovie
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
83B
MD507da7fea98503b3e23912f04b0f83867
SHA1b41e43d2bed950d9d987f36aa71194e324e9e24f
SHA2563a8a91ac62a312fb043d8113f1c176ae5192bb28727d8c9f23555959c00e58d1
SHA5125710ad74831de328bdb16f35b26c3261d2f3fb8919c352a06a57649c4e4d2d5ee251199352558a2dfee432865f371ab8c18bac9a5f8295880672a45fe2fc8ad5
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
81B
MD58742bee78770b95805749aaffbd9d826
SHA1dbd1266bd3c63f67a126c4a06fd0d60736d7ce8a
SHA256d821c3e84847e6d7b7213c7e8b3298f4aea10f38cf2b39528fc679d765716386
SHA5126d6d057b78fa9aa20a19454e39913340477a9ba27b5374951cb734b67ee2f533290c33c595b659ece8608eed27d4294f725798934fa4d62319898072f85c272d
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
80B
MD50ca3aa8875a434a060b4d3f05406a441
SHA1f5126354cc1d21f3b915e984ca348067e9ad0b95
SHA256d0f3770caf130fb2c65b97aa82bc7047152b5ea630e7acf1f9e8898d9fc563b8
SHA5125c595dc9e59f4098ea84504048fbdb779da0279d0a98fdf3ffbc4382fe8057f4eca9c0ba415e06747330349ae6bbd5485770ef02771a10b03e7bbdba7c40efdb
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
84B
MD57e273f5bd293e1143934cf45ecc3b4e9
SHA1f4a1681c9df5d62811ca65af5fd906375076c616
SHA256ff9f4281580539df1b43c42d67a84943e2a4537d79882dd8b541d83635c62c40
SHA5128dbf6c458a487070663caad139d594bd28ed128217c175dd13a642f83137cc64b11e97fe9fbb86ff5afbc732dc15b900e1ae2413eb269eef2b90d553ea9bed74
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
79B
MD5c84c7bae2623dd42b37416d306d54829
SHA1c5c40e436b2d3a781667005826b593fab34e4097
SHA25660999c21e9224c9d163b3684536f341be16ff29b2e54dcb483a39b24d6dfd78a
SHA5123dde9ab3c0ae7996ce89dacfa37074cc24b188ceb06cc0561723d32657061925792ac55a94777c4650d51a470fa24b9a0d0dcd4ce0fc9cb53c8f2a8226465762
-
/storage/emulated/0/2024-05-22WJLog.txtFilesize
277B
MD55f76ad56e49febff284559a69165e509
SHA12eb8bece17d3ce9819e32e42855af025bf839768
SHA2561cd60de7cab492343de6d6bbf3afa0314b96b5e1629cc3420c9c850fb8e6f463
SHA512f8e3ab3ef7a3b112af924ae8e1e681060d1d9bc49b753cffff7b91139300fc767b4409eea665460c0670eb390cbd77125afef83c1726a9eae9844389303508ca