Analysis
-
max time kernel
129s -
max time network
133s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
02-06-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
8da632c8b92f1ce73523307767424f3b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8da632c8b92f1ce73523307767424f3b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8da632c8b92f1ce73523307767424f3b_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8da632c8b92f1ce73523307767424f3b_JaffaCakes118.apk
-
Size
3.3MB
-
MD5
8da632c8b92f1ce73523307767424f3b
-
SHA1
f483b46d2ecd36cd648b61680a7462feae25db0c
-
SHA256
8f4002a445df38ac3cc6db81641d0ce760decb176b367f4e70294bc536effdda
-
SHA512
3b2618bbca2f963232dfbeffd2f73e5d211818fdded57f1f93086b843447c8fea368beda6585a91c6b676a76707f87383586490c1ea282b877c2b68bbfd081af
-
SSDEEP
98304:xEzVzxmeaUy2i2FuiFbRREckqvCqQis5MtM0JNMySN7sXW8i:xoVzxmeaUy2iCuORREQ9sMS0J1SFuWB
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.jike.goddessdescription ioc process File opened for read /proc/cpuinfo com.jike.goddess -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.jike.goddessdescription ioc process File opened for read /proc/meminfo com.jike.goddess -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.jike.goddessdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.jike.goddess -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.jike.goddessdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.jike.goddess -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.jike.goddessdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jike.goddess -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.jike.goddessdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.jike.goddess -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.jike.goddessdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.jike.goddess -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
Processes
-
com.jike.goddess1⤵
- Checks CPU information
- Checks memory information
- Obtains sensitive information copied to the device clipboard
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:5113
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5a330a20b6add3b118454881ef10f3502
SHA125a678d834ad9741e51fdbcdd34c35b4a82c91cc
SHA256c6629a8666029ad4e4e762280b5c5561c6eb54965f56711243d6a5f20ae36c5a
SHA51246135a5f27d165b8f7dda68ede0297c3c592e17a1c0d34b738c4d6495d82a20f9494f14ca418cd41a19309866eec60e5ea266a05a6bbb1056a944ddbe48bb81b
-
Filesize
512B
MD5035e035b140d803b3063cb974219c5a5
SHA152441f317145df930b9b609a61aaadf862622ad1
SHA2563890c69859c8cbeb22f61473924aec99d21f2bba05df4b77a74cd746f1e0aad7
SHA512441e0363b4d334dd4768681ee2490ba63360e83e2932fedeeb15ca2cd396fd0021fd0b5debb8de1a2716fd9b24cfb531e3c52335d428596c3eee0c71a0f75c44
-
Filesize
8KB
MD52d9715127add5c16bd196e69943f6a63
SHA114edb6a53ab4ad13a385ae8d0ecfccc9560ea908
SHA2568be2afdecbeb00476533246281099b5a7fe777865ad8817f26cb6274df6ebd47
SHA51224f65d5fa82b45b3aa3a030fb79decf30cdcd432c61c62ed1e60d20370f91aab8e853cba3dde4ca8eca169650041b7b947767a36e5530c5a2a3e781ef530e593
-
Filesize
8KB
MD5fba1fb9a6004189682bad6d6ecfb8b6f
SHA1eb881cd72b27a73e8d5b1b6789d7784d43f2f724
SHA256c8ac118cbee1f9b1b1202d365d44891609d1ed38ddf00764a7aa406f9901b28c
SHA51255f1d864f5446db539ce4a6b780a823948283a33920d86de9691da21a9446b1e0472769d2e40b1a31e1968e90e6d4f6e0f2f1e0a70be425cc826f5992b698204
-
Filesize
9KB
MD528c28cacf52e4848e072187682b276af
SHA15e55f4f038ffb38c7841cea07b17c4a648647d1e
SHA2563f56814aa841007b0b2a764e80ee7c18ea7a05b055396770a8d7b3963d738460
SHA512824ea4a19392dc9e6970a37a4d4173f6bac7e2031139333cb54980b57e291eff1d1d5554d8ba240cd709eb3541612ca05a5280b8209a9a0f51ca65e7aea5fd6e
-
Filesize
375B
MD5d165a3c4ce691129245f9081bb3f70e6
SHA1c84177893384e7b979a069e5f5b8fd52743996c7
SHA2565d6d5455a985a59bcff63c419dde4f03d6e3933a502ada91b5c644e94ab2e746
SHA5123d2c71cad005e32786120f8776872c19a3295e015f2645424d7e0cfa70d6b91eeb874ed66314280ca206b09b451ddb3ad3e3f49e377843e9fe3c88362039ce5c
-
Filesize
465B
MD5fe5e9467dfc4ac4249fede55f189008b
SHA1bd5b0660cd3e2a1030d7ff63ea822a972def59fa
SHA256a26901f94c13e4ffcbc580fa7486a5ee347d8ad09c02e49e113f6136259d1694
SHA512c5f844b42116c5ea3134dc9a85944017c9284ccb74174268d24bd3776edf971a0d138bb7eae6cd3cce2348263e6b65a9a67344436b1cd05b64f601c4147d105b
-
Filesize
1KB
MD5183e6eaa4dad821b79f1ff54d408abe5
SHA1b8d82a559bef80088066ac7c16e2cf0285df3f78
SHA25652d786192bcbfb1225b8bd253b9b1e8be706602cb33d759f7d22f207806e9be6
SHA512f112cddfba74977bf55f45e52ad22db0b9e761a6ca649d68e82b956a0d066aff5bcd350fb15bba04bad472e08040c85ee1efdf40c8f3078df342deebe72e9cbe
-
Filesize
102B
MD5f144d8fbe55cb5393021f6ac43d91135
SHA18ecedcb7d0db1973068ff87072380607aaa291af
SHA2560c8994ad8090e402cc99262ccf2c82ac8c74b5b4cce886d9b5b93d00f3b6899d
SHA512df879a111454357cf2c64e2965698a61d6e965d11f6c279d3dbf07961b056b7f472a5f1d32d2973276516c8c99aafd0438e9c3767be955862caa80a336910ca6
-
Filesize
195B
MD5dc5dac2f6914c58c3413311233413d84
SHA128be9bed7ea4f642155392de280125b035deee68
SHA2567f9cf34d29710e678d4b640a45fe6239345b9470272426d01a442b4690c8173d
SHA512838a381d10e97a2411aabf6c04e0176529f0cccd76095d6f613c70ebb02426909b92fafe73ee8972a451e0702fa0c195add658491759a6fa6c7a528022813e0c
-
Filesize
286B
MD52835095313fc125b68b5d7c240b82002
SHA1254fc86e029d9b3a0ca4dc797557ac9abb787ea6
SHA256d86f2533b6ca06a094c0c49fb292dd76b59ea7bb01b1d8584b39fc75a9307b6b
SHA512b5ece0328cacb0a9ca21325667cd4ae1cac265c8b509cecaab7214bf6a9ddb7a61f36997bf2ab0323bbf22eb174318b042bc8f492e6e0ab7d5bd1e2c0aa942ca
-
Filesize
20KB
MD5de995f3c0010ca373e400d25397ea355
SHA1a1744364382958ca1e5c066d7d864e77359826a3
SHA2564672d9c2629545f43e2168769ac93a27d4185f3fb5dca10ef959063f66078d2f
SHA512accbb09be18a1feed2fa74d87ff5bdaf57eb88390f6c86ade3e5b0ec9e1ac4a09ac3707be8b485dde50af17449cda85c544b0fd8503628fb521e2bf2e31bdaa6
-
Filesize
125B
MD5e38d1e44a211a8723fd2ec03edab3ec8
SHA1027a0a1f78245380f58ac727390667b0990d2b8b
SHA25619f3935fe2213f24221e014193da3f5e61f930014dcd02f0da426b63ff5c483d
SHA5129880305f6ebc01b103d2ac01a188c1e101f0d7deb9611e1237a784843ece0e8721077eee924513f2291bcfe35e5b5f8e57568ab711c46c9005ba08ab2472277c