Analysis
-
max time kernel
19s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
22-05-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
67ee9bfbfe7df5b650a8a69afe59cd63_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67ee9bfbfe7df5b650a8a69afe59cd63_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
67ee9bfbfe7df5b650a8a69afe59cd63_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20240514-en
General
-
Target
67ee9bfbfe7df5b650a8a69afe59cd63_JaffaCakes118.apk
-
Size
4.1MB
-
MD5
67ee9bfbfe7df5b650a8a69afe59cd63
-
SHA1
629cca00ecbfd41a77ddf36c72e2b185191288de
-
SHA256
5ffd8374ace87d26be6a7a2028b5988934dd7aab3c6f16b069559dcff7d51ce6
-
SHA512
b84f7531fe284abcd5512098b9cc7e06473d6521eb8708a797b61a27c34d4bbaf9b5340820d25cbb946092165cc1bd7a618c670287118b9f98b5cc368473c171
-
SSDEEP
98304:F9R9ml0wEdS3ZPBXYsupKdw+taxMx9ZUrHxyjywJBg:l9ig4ZJEp72axMxgrRWM
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
cn.zhui.client3088934description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo cn.zhui.client3088934