Analysis
-
max time kernel
49s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
29-05-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
-
Size
1.9MB
-
MD5
820f46eca72897a7738b3b5c2526063d
-
SHA1
f3b87b5fc4837ec752357f6536639f91c7400840
-
SHA256
51c3fed39510f9b0af862b8552294ceae6aeed6fc879cca6b53379e099d58301
-
SHA512
9900dfe6793e73756ad864409fbc478529c17df00caa5f57eac01719a823d1195730790d70b46584a03f4f3ed2f1b829e2be9be2f40a5bb1d964ad3471df609e
-
SSDEEP
49152:4qNGWEGPFJT6sdThCO2JK1H0jw878KQm73ZGj:4qo+9JjdlCOmn78zJ
Malware Config
Signatures
-
Processes:
com.spacegame.cashshow.hackpid process 5235 com.spacegame.cashshow.hack -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.spacegame.cashshow.hackdescription ioc process File opened for read /proc/cpuinfo com.spacegame.cashshow.hack -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.spacegame.cashshow.hackdescription ioc process File opened for read /proc/meminfo com.spacegame.cashshow.hack -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.spacegame.cashshow.hackdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.spacegame.cashshow.hack -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.spacegame.cashshow.hackdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.spacegame.cashshow.hack -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.spacegame.cashshow.hackdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.spacegame.cashshow.hack -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.spacegame.cashshow.hackdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.spacegame.cashshow.hack
Processes
-
com.spacegame.cashshow.hack1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5235
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD512627a2ec645c4a4bc50dba5903afd59
SHA1504005c938517e61bcf68b65a055c2faba635c2e
SHA256f177ffae9650eb4f407c2d9a510bb5a5abe1ece2fdfe24effc62478a1bfa5903
SHA5127ff69589296e02383a217373399e75d8a82fa17146e4273f4c0eb630f096dd9f394a3324d60858b02f7e5cf177c82c6d966f5cbedb68ae6a98df7cc851b79cfd
-
Filesize
16KB
MD50ed77b773b3560182bb9d2a0ba34db7e
SHA1c5cc7bea4946848b825cfd2b5f58fb55e7652788
SHA256429ff6c26a3345418df8d5fbfeeaa42de885b03fa0fb70553a420c14316ed4d1
SHA5122862c2209e701f04a3dedb0b4d989c45fd11656fc04803673bebfd75242b9056530abe1b3ab44d44355d3ab0e6e2f3fd93edeae3bc5880dcaa0ca38443be249e
-
Filesize
512B
MD5807b71ccbf299de47f6ae5b27d178b5f
SHA1a8986c5fbebff8e1cc57592f757f52633b1b068e
SHA2565ddbeaae469b0dfbde170dfb5acad78429c9ebd8043db2f462896797742a0a84
SHA512ead2e389d7f8a0ddaa2acdd4e2c61ff11de87bc5ee3bbf837136a19b17569de8630e9fc017060308ddb2096314ece2d3a015d1b8a28bde66ddfe9729305cda26
-
Filesize
8KB
MD5f6b0ec07ba04999f9ab7ba61c08fcbd1
SHA17d18ac27c76aa6cedd196a1a2e122ab2c8a7b8a2
SHA256ab2bae7ea40eaf257dac964428ac81415b0143574a907afcee75542b7f129b7d
SHA5120e5e16a755f4a6ecf836a45418a801d045c4d2379b970973a8b1debb10fb6f8a40cb0d464818e37c638f32f15bb1dace1a16e7e34858c4ec4b53bf2cff7db39a
-
Filesize
8KB
MD5349287c478afb46ff79aaee5064949fc
SHA133db15ad1c005a368b0d4290e34a4468bd050a10
SHA256941d2f623a9c919000e3223c44a0a6d26173a64f90b5a022cbf45c9d79869301
SHA5124a06913d11a257d8b785e5630ce497895fe0cbc3e1c90d9c1879bee7eb2de3cdeedf6047b47d4e95f46b7bb7984f755e7da1828f428c5ee83729b7558069a610
-
Filesize
8KB
MD5613624b6518888e1211419b6bdbcf85b
SHA1282bafe999ab32837d8a9b6ea3ed3a51e22035c7
SHA2563a2ed041019f3a54b2d1bdcb2d4f3bc9352f18845560e22d6d34c82dcb8ab185
SHA5121dec68900a81137e4ce52071801e2d9cf7cbcd5d564bc97dce6b88f3b2c759f9bea83d160a5470f1d2e846875329f6d42d3e0f4da14a12c7d5929988aa57bfd4