Analysis
-
max time kernel
19s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
02-06-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
-
Size
5.1MB
-
MD5
8cb5cc9d531f6a648f533cc06af218a3
-
SHA1
ec9320ee1dcb5aa60bfdb0a658c4836e3116c7f2
-
SHA256
4d3d8ebdff912f1afda9270db18f77d5d3c5c8eaa9e423ccd68d2ea68fa62003
-
SHA512
0265cd116b89fef2959a4215eff9c7920526b622bb927f69963a08fd17bdfdddbf868e9835ca5b119b19c79dce6181d1fc27effdfc9747d3a0887bc57cc6ec90
-
SSDEEP
98304:/jPmqMj4ZMlH9Q1Cq82Y1uUwCf10ifm0Le0sdnTYfn5qkM7Zb+6f6NknsTyxz:/jPmr48HA82Y1uodtvLEnc2b+ScknoCz
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process File opened for read /proc/meminfo jp.uxdesigntokyo.moepunchfree -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone jp.uxdesigntokyo.moepunchfree -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call android.app.IActivityManager.registerReceiver jp.uxdesigntokyo.moepunchfree
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD517c3c6f886de4d75103444377a0af642
SHA1c5f685f1c12083f642a57973972eb8dfd740a9d7
SHA2561f429fc82f4c319c704936137eaab6056a0f8ea8eaeee422f080d9d9aae38a5f
SHA51289bebfc30fad6f729075edb56f00e075b62b65aed26240befecd278de4a711382966b47c1dffdec29918a21203aabb6baa06de3d5c6c29d27b5eba858901516a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
32KB
MD56357d03047de43cd010c0e860e287a4f
SHA1b901c6ffb241e7a29a9f6f09f89f7d2fe089eff3
SHA2560c00bf0b69fc0c481a06d585a740943f55ba2c963f3137b82278291d915c76a5
SHA512f5ca9f91cc99a270d7e4161d7dcdf10d6d78f36815e322af00413101dc6c506831ace2cfc41fc7c33bd5c724b77f312991dbe2de4fde0b9ad2ce3351958b2c5c