Analysis
-
max time kernel
47s -
max time network
167s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
11-06-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
9fc81087067a5e3b86a38f77d6fa46dd_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
9fc81087067a5e3b86a38f77d6fa46dd_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
9fc81087067a5e3b86a38f77d6fa46dd_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
9fc81087067a5e3b86a38f77d6fa46dd_JaffaCakes118.apk
-
Size
117KB
-
MD5
9fc81087067a5e3b86a38f77d6fa46dd
-
SHA1
af5f899a1db07eec03974fc678e95db3419f6fc3
-
SHA256
25f20cf9651e60f112e46ddd73159a576c411fe156cda57d783adbbf619a7087
-
SHA512
83e9fc932d7abf3bc196b809e3f2df5ad8a8cc34bc3487be6c1074d9083f95872784b0f3269fdf5fa0cde850a4b47879f9902250ce153b97b55fe1e76aa7cc51
-
SSDEEP
1536:NjjKdvo17NQhUE9zhQwPJvd9DBI/tdP3UtwE+BqysFQcdr7cVdlVm34oEGUUeW9g:pmxG7SaEb1aVN3UtwE+Eysy7dlVxg8T
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs