Analysis
-
max time kernel
110s -
max time network
171s -
platform
android_x64 -
resource
android-x64-arm64-20240611-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611-enlocale:en-usos:android-11-x64system -
submitted
11-06-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
9f17f6c06e4ba47440ab71d823b600cf_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f17f6c06e4ba47440ab71d823b600cf_JaffaCakes118.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral3
Sample
9f17f6c06e4ba47440ab71d823b600cf_JaffaCakes118.apk
Resource
android-x64-arm64-20240611-en
General
-
Target
9f17f6c06e4ba47440ab71d823b600cf_JaffaCakes118.apk
-
Size
1.9MB
-
MD5
9f17f6c06e4ba47440ab71d823b600cf
-
SHA1
51b95307d59db69aa36ed1534f4c1c601ec98ae8
-
SHA256
733995d925e3105d70116455026b56ade6c056662317a27f0c1d3e05df7eea3e
-
SHA512
36a71f5b31ed8a161d621f5dd6783631be2cb21ca7b23aa5dd913f32294f9106f8bbe6af66fd0fcd726b75362f6c826582b5d24f35847c0c5b5b1e6b8fbff3aa
-
SSDEEP
49152:YKek5bGxXIgGEEiaIUwo4BL/73rApAab0jnFW8/9:YKeKbGxXGiJUwoCL/s0TQ8/9
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs