Analysis
-
max time kernel
58s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
02-06-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118.apk
-
Size
5.1MB
-
MD5
8cb5cc9d531f6a648f533cc06af218a3
-
SHA1
ec9320ee1dcb5aa60bfdb0a658c4836e3116c7f2
-
SHA256
4d3d8ebdff912f1afda9270db18f77d5d3c5c8eaa9e423ccd68d2ea68fa62003
-
SHA512
0265cd116b89fef2959a4215eff9c7920526b622bb927f69963a08fd17bdfdddbf868e9835ca5b119b19c79dce6181d1fc27effdfc9747d3a0887bc57cc6ec90
-
SSDEEP
98304:/jPmqMj4ZMlH9Q1Cq82Y1uUwCf10ifm0Le0sdnTYfn5qkM7Zb+6f6NknsTyxz:/jPmr48HA82Y1uodtvLEnc2b+ScknoCz
Malware Config
Signatures
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process File opened for read /proc/meminfo jp.uxdesigntokyo.moepunchfree -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
jp.uxdesigntokyo.moepunchfreedescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener jp.uxdesigntokyo.moepunchfree
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5ea044fa9dbb0bbc73eca7d7abca80e84
SHA1ac6ad1c20be03585b96e1a16e79bd46a3ff324c9
SHA25693d5566a6483f10f501f70f81477a350bd08f2e707f85cbe25bd6b8a4620a040
SHA51222062f4aebcfcdbd53d402eb54540a5779d3e49e841d782ad056705a72766590a5e168e2a7f81c0ed5ca0c8b479f6c51e4b0f3e3d54dd49457b3b5b48478576f
-
Filesize
512B
MD5667b6d33ab27a8bdd1832b296ade61ea
SHA13168374ee3b64786b9c64f1bd1f2f15b23f7d74b
SHA256dd5f4da619538d0369e02abac333566fb120bc25aab14a9f6ab33fb5785b5cea
SHA5126b9ca8c79ca8bd8d6e1aa2fd1cea237a458500585168a327b77814d602096c6dc842cfaa549dfe09d065ab2b49ca9e4c00951a7e99935f5326b8c352eb614c89
-
Filesize
8KB
MD5c9495a9aa9a9dcb05896fef734ea5b18
SHA1f056c4f6054816162df566f042c5c83516df0084
SHA256590194a70d0089eb5860eefe939c6fb45a991f50674047716709a5f9caf4d6b9
SHA5123c812de61332fa809cd13541b65e9456c8c36db346ce97e952352e38f3e41b9a3d4f375918a70e33da653ba00b8d51dbb24f8e9bf712a717dff59eb5da78183e
-
Filesize
8KB
MD519d3cd6faaaf0cebf30ff0ae904acdb2
SHA1cc36344ce700818a11422c9e6b2a4a9a86870ade
SHA256d5fee8eedd3a6915911994d2a2703798d59fd961721083be4fc970ca531640b1
SHA51215294b9fbc0909722da82497eceee3db5cb5ebcd01d119b17f618a83bf281fca265e9c4749e43c2da364981eb455dc75ff927a11b4dcb1b7bc5cd99cf678520a