Analysis

  • max time kernel
    29s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    24-05-2024 08:12

General

  • Target

    6dd909ab5fc66737d352ac8053af6e3d_JaffaCakes118.apk

  • Size

    307KB

  • MD5

    6dd909ab5fc66737d352ac8053af6e3d

  • SHA1

    9276b6a9840e7e5c06bc0243d7c4e22e76444099

  • SHA256

    c35bc9c550f38f5ed46681e0f43265e1da87384dad3f2f585bad09a3c03188ea

  • SHA512

    cc01e8341dd6e9a2c1623e067559e3ed8e82c26133365cba8450d70a892fef025ef991d19503f8df0106dfa936d559ea2991e1ae7bab1be34d9c6dc8aeb467b9

  • SSDEEP

    6144:9VRnz26En9QKl3GQERlPhlP+4g73KnVHrGoHD8OAApWkQFtzg:HA6EmRlPbPPVyoHD8hApgzg

Malware Config

Signatures

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • small.word
    1⤵
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4621

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/small.word/files/sentences
    Filesize

    946KB

    MD5

    21ba8a713a2f0e954abd9b7af2a26b5f

    SHA1

    e25df111355453267ef7a9d1e01f3e988606f5ca

    SHA256

    b5efdbce758a5094ae1088d62b5d3da7e8a7b357460c08f1f2be0d9ec477e576

    SHA512

    9388a8545322562184a51da0d7c89200962623c3ca2441ce6b0271f65029698b193388c0388c1c617275f09221753bebd392a430d6302f2fb38da56630a9fabc