Analysis

  • max time kernel
    71s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    29-05-2024 08:12

General

  • Target

    800e6588a96edd11be8b2ca5fa04bec5_JaffaCakes118.apk

  • Size

    624KB

  • MD5

    800e6588a96edd11be8b2ca5fa04bec5

  • SHA1

    e9322a946ec8c82d68550a48f025467f57b7d1b7

  • SHA256

    5b6bc87995122a393c07450777a21b252468cdba26eed57df954af6ee2348bb2

  • SHA512

    1906fc9dd533a536267f54175576188a86ecf893b816d16bd53f01319d5ffe0fbbca3eb5634f16c9a2da38518f511c8ad059688750cde180ddaa078f6ad220fd

  • SSDEEP

    12288:AYZR7w8p6vVjZtYm+wLUQb7qSAZ6iEvDJWHwIQW:AYZR7w88jZt7+94ziiALB

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Tries to add a device administrator. 2 TTPs 1 IoCs

Processes

  • com.freexxcams
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    • Tries to add a device administrator.
    PID:4538

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads