Analysis
-
max time kernel
172s -
max time network
147s -
platform
android_x64 -
resource
android-x64-arm64-20240603-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240603-enlocale:en-usos:android-11-x64system -
submitted
04-06-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
957ee94b33acf6a8a482574dadf4a5d3_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
957ee94b33acf6a8a482574dadf4a5d3_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
957ee94b33acf6a8a482574dadf4a5d3_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral4
Sample
Fluent.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral5
Sample
Fluent.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral6
Sample
Fluent.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
Fluent.apk
-
Size
414KB
-
MD5
3d596b729e275c8822001b56934f3acc
-
SHA1
2230deddd141c20ecc3a6c2ead933107802494a9
-
SHA256
9ef6b169afbf9f140dfba4cad958c6a096ffbcf05a707fc43f5d8e0449f62407
-
SHA512
9287a05b4e9b7ede8b7a1f12cca41339c5fa5b04723a052fe9176b5f40afb4a837d3f01948af3741ea4eb49680ab9c02a325cee5be83556567f758a646741636
-
SSDEEP
12288:NsGhcUBzjcKDtU9Cq2TbD6+iBshVBhJ0BxZyiUD:NsG3rt2CVK+iGhVBEB+D
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.fluent.xyzggdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.fluent.xyzgg -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs