Analysis

  • max time kernel
    63s
  • max time network
    139s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    24-05-2024 00:50

General

  • Target

    6cd50c5b420bfc2999595f5e59bb330b_JaffaCakes118.apk

  • Size

    24.6MB

  • MD5

    6cd50c5b420bfc2999595f5e59bb330b

  • SHA1

    cc3dd240efb77ddef150009d8b65b4c87dff82f9

  • SHA256

    f84cf26d5978cffa2a36dc4f31acc6660c088c81dc6be670226e95f15ebf2013

  • SHA512

    3e4ade45653790f858b3e2b2add74ed59777840170919dbc3a7a20e5300d22a5f7127410017a3a4ddde053f764cb3ebdb31dd3a3955ddae568162a50d0e8b4f1

  • SSDEEP

    393216:PQtBWd+QtBWdYQtBWd9QtBWdJQtBWdoQtBWd+QtBWdwQtBWdjQtBWdKQtBWdL:Y+v+1+Q+w+9+/+N+O+D+J

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • com.zu.zu
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4670

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads