Analysis

  • max time kernel
    168s
  • max time network
    185s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    22-05-2024 15:42

General

  • Target

    67c4ff863360105fb4200d625ee08ede_JaffaCakes118.apk

  • Size

    3.0MB

  • MD5

    67c4ff863360105fb4200d625ee08ede

  • SHA1

    66d40982d52c1f158d42e9d7607763fd6e231ce1

  • SHA256

    5dbcd74803f0f5db906e69e9467b12179423f6af05c988a1d264f122f056cf04

  • SHA512

    ad2e734333a603b194a04a1cb8405994598cda908640900a469cdfa7b6575b656f1c4400e4978331af5077c975b18d3db9f004e0d1ebb639e270898b60ee6aa3

  • SSDEEP

    98304:zoIwJK5JJHZQr3nwZfZw2qfPY7DPnBgqe:z1BZQDwBZjqfg/nBg1

Malware Config

Signatures

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Checks if the internet connection is available 1 TTPs 1 IoCs

Processes

  • com.maiy.sdk
    1⤵
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    • Checks if the internet connection is available
    PID:4639

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads