Analysis
-
max time kernel
154s -
max time network
167s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
11-06-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
9f9d55d28173f2ee5c4f63c6466b4cf0_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
9f9d55d28173f2ee5c4f63c6466b4cf0
-
SHA1
ddf444e755a666f2063d9ee9afa33629c2093927
-
SHA256
803d6318645873fbe3d9d1c274c231159e5be72b4dca63b62e18fe9cd0b931b7
-
SHA512
72b4c643405f6426c55d13a94e4b3b2339738a42cae5e31395c9f4cd5d4cb57f2ccd761fb5786dbaea6525b3743005b758eecec2624429f58fe6f8c5aa47bfd5
-
SSDEEP
49152:/zAtkicRShU6qLUR6PZ0WrKypS844x7u13Y:7MDOS26TR6B0WrK+l
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs