Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
27/05/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
7756878fca235f00d16d4eb337392d05_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7756878fca235f00d16d4eb337392d05_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
7756878fca235f00d16d4eb337392d05_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
7756878fca235f00d16d4eb337392d05_JaffaCakes118.apk
-
Size
5.3MB
-
MD5
7756878fca235f00d16d4eb337392d05
-
SHA1
60aa974c8e4c03731a2cecbb82749710781bc4d6
-
SHA256
6d7cedee5706fd878680bd6d3b912e8fe991952f9dd13c8caa5c169ad5001e77
-
SHA512
4deab3c996e179f3811f0b7eb74aae35f42b09897d8563c00193c3e7947a5f6dc223568b0783eb4961fab7509fa381e36774c1a14bcb2884d32cd3d91b590482
-
SSDEEP
98304:ozq1vWv1elmfAJncogsroZdSmz8r7WUmMqDODZ0Tn6VlEavvqby0ioQw:oGMv1nYcogQrqUrq6DHl5vZHoQw
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.yxxinglin.xzid119018 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.yxxinglin.xzid119018 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yxxinglin.xzid119018 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.yxxinglin.xzid119018 -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yxxinglin.xzid119018
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD521c082252139650f5bf604351fbc100f
SHA1ac891965b034a9db9c5a87a53c42a08a3236d180
SHA25641db1892a0515c3f7487858ebb88edaaed523ed4eb1af75cd44cda6f222ca1d8
SHA512146130b7cc776afffcba47b6562845b2f9417d7fe06acfc61dbbf780919119f573b10c22668c7d4132ac4db9afac5c9bc7764728c7375d17477839ebf7412dae
-
Filesize
512B
MD567073a9800d74a9318d3c3bb423e5ad2
SHA1af59f0e47c92968e4d4887fec34add0c45c8dcff
SHA2568ae9873a0c6eb1cb30d81b6fed65e1c11ddad4017d9be9b7b01f7fb48b225a1c
SHA512f0e9db23020eaaa7d76b338895c3690801d0d53075ecfb79602fc0c8776fdbe0cb7dfd0aa6c86fa3c5f85b0c4784c1f7ae8266b002c367a509c0d36e3ec71dcc
-
Filesize
8KB
MD5622f16f29ace269a13d87448b21c27a4
SHA1cce52480848471bcbf6ae5456da74ead9f22fe0f
SHA256ea2abf973cf4c7edf9ff830a10a121e3719077641fd01a2cd58cb62030fb4155
SHA512087ff6672b9c7c8535f9bd294dc9f3144620aa61c2066170614c0366310cb3f91c3023dc7d2dabb034ce4df7d017bcc379eeb440b9bb44d2084a8ca22b16a5da
-
Filesize
8KB
MD5573d0e36f3e2b30f0423f1b192c6b9be
SHA18ed36ff7a594efe336cb8a2acacba1559bbc6c65
SHA2564560aec8c7e3625e89125464059e7d08af142d683512f61c4340c3743edc1880
SHA512ce5aef254ddd85dbb27836c496ad7ca81c5910fe2c0cc2d5897e82fc55437ef8f57f487237d733f37ede2290b35118f77055b9718f1eacd9c360089101be0efb
-
Filesize
36B
MD537e8e716e0e2f4a0b05cd9571d95b84d
SHA1f8d068f6931707bddb8cd69f706f2224ad1fea3c
SHA2567080cb592d5149c858b206d3fd0d5e3e7d601f120af00b2616bee928ee1291ca
SHA512e62b850901835fdb73fa6224618422f721dd765861d42f6bc2dd013413e96bd910ac5313afd9b4f63da74beb12a15fac81b5157456c9caa3031862dab84423f6