Analysis
-
max time kernel
47s -
max time network
177s -
platform
android_x64 -
resource
android-x64-arm64-20240611-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611-enlocale:en-usos:android-11-x64system -
submitted
11-06-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9f100c414d9fae5df5e9a6cc21b483de_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f100c414d9fae5df5e9a6cc21b483de_JaffaCakes118.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral3
Sample
9f100c414d9fae5df5e9a6cc21b483de_JaffaCakes118.apk
Resource
android-x64-arm64-20240611-en
General
-
Target
9f100c414d9fae5df5e9a6cc21b483de_JaffaCakes118.apk
-
Size
14.7MB
-
MD5
9f100c414d9fae5df5e9a6cc21b483de
-
SHA1
57e5f7df7f894e520db8453532f016c44a067278
-
SHA256
52660c32b87d992461ed3c895fa519a80e7f4de6136050d13a2f032ff4f8cbf1
-
SHA512
bdcb5f61ba6c97820afd0c635bc4896cf2699e1755e263da4ab600d80d6394f3b39f175d52c743965a8da25ca2aa5873c4148541f8bec73b435ce2ecb550c702
-
SSDEEP
393216:AQtBWdqQtBWdNQtBWdnQtBWd5QtBWdmQtBWdW:D+D+8+C+I+/+c
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs