Analysis
-
max time kernel
49s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
02-06-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
-
Size
5.1MB
-
MD5
8cb5cc9d531f6a648f533cc06af218a3
-
SHA1
ec9320ee1dcb5aa60bfdb0a658c4836e3116c7f2
-
SHA256
4d3d8ebdff912f1afda9270db18f77d5d3c5c8eaa9e423ccd68d2ea68fa62003
-
SHA512
0265cd116b89fef2959a4215eff9c7920526b622bb927f69963a08fd17bdfdddbf868e9835ca5b119b19c79dce6181d1fc27effdfc9747d3a0887bc57cc6ec90
-
SSDEEP
98304:/jPmqMj4ZMlH9Q1Cq82Y1uUwCf10ifm0Le0sdnTYfn5qkM7Zb+6f6NknsTyxz:/jPmr48HA82Y1uodtvLEnc2b+ScknoCz
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process File opened for read /proc/meminfo jp.uxdesigntokyo.moepunchfree -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener jp.uxdesigntokyo.moepunchfree -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone jp.uxdesigntokyo.moepunchfree -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call android.app.IActivityManager.registerReceiver jp.uxdesigntokyo.moepunchfree
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD57b96a9a688fe953c1e84597e5422a584
SHA172832e50e06d8a56863522fe7459fe798f8c6857
SHA256f5c4162144d2db181d51a7e522dc4b3037c0472b6cbf0cfd9b305627cbce7250
SHA5122460c172cd522f228116a6bf3084664074d1cf5fc70ad021c40b3b136a0478011b4e1e755ae01cf95a3d6bc9c7659d6e93be7edc51a360ebb189d5288ea65ed5
-
Filesize
512B
MD5f26d23f93f2358302e9430f369a14835
SHA1ad43e52328c2c6b4821cc97e4297aac0e995f018
SHA256679a25568845367c7662115555cea5d9c05bae51b7380838ce8bbdf3cbbb6aaf
SHA51248691e9ede80ac1b10a65c956a77b76517142927f21bb22697b066c4654cac064d81dcf5dbd966fe76393ba070209fd6d71ee6e8a9090e68332ed81c96901eaa
-
Filesize
8KB
MD51e2caa109e36edd90cb428e5213e99ff
SHA17ad19805cded71fab79b5db9ceee107e4e364581
SHA2567fa52ca4aa129aebb476cf52703f2ff88afd4b119d536cd1deca10a15c1edc3e
SHA512ff7a372a33e7da3090be86fa803c0754e027cc80a33a9cf6d1f327fbc86810f1eb0e7eec5be61e2a1ba5af5cb14c5fec919dfd52f2205bf672f2f7d12a6287a8
-
Filesize
8KB
MD5c1639062e5945b3a3df13a260d34cb1e
SHA14b66d45c53f97f32e4578996173b7c05d5625bd2
SHA2565dae5e732e30672efb37fbd657d17094d69df4b5dd7c3df42f246a1ee52f6300
SHA512c1a5f52e34edf3421deaf1cda8a0d4cc9a6f1be3cca32fc9619cf621c2692a16dea77814ef90a502aa0d48b355b7cfd136cea07f5ceffd276e384889a8ff6150