Analysis
-
max time kernel
151s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
11-06-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
9f9d55d28173f2ee5c4f63c6466b4cf0
-
SHA1
ddf444e755a666f2063d9ee9afa33629c2093927
-
SHA256
803d6318645873fbe3d9d1c274c231159e5be72b4dca63b62e18fe9cd0b931b7
-
SHA512
72b4c643405f6426c55d13a94e4b3b2339738a42cae5e31395c9f4cd5d4cb57f2ccd761fb5786dbaea6525b3743005b758eecec2624429f58fe6f8c5aa47bfd5
-
SSDEEP
49152:/zAtkicRShU6qLUR6PZ0WrKypS844x7u13Y:7MDOS26TR6B0WrK+l
Malware Config
Signatures
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.adzujl2572.blu2572jzddescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.adzujl2572.blu2572jzd -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.adzujl2572.blu2572jzddescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.adzujl2572.blu2572jzd -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs