Analysis
-
max time kernel
125s -
max time network
172s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
13-06-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
a38ef13d4b68ec05799e0a03bf9710c6_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a38ef13d4b68ec05799e0a03bf9710c6_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a38ef13d4b68ec05799e0a03bf9710c6_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a38ef13d4b68ec05799e0a03bf9710c6_JaffaCakes118.apk
-
Size
150KB
-
MD5
a38ef13d4b68ec05799e0a03bf9710c6
-
SHA1
9dceb68af591305c0274594e64008a1352160dfb
-
SHA256
4ac4b1712d0967992261b3b5b763b8e36c639014349b3e6aee9d97ed9064545f
-
SHA512
6fe1294a48ffb6932fcbe427c6fe55064aa3e2dc831110aa3cf5e2f89eb8ac482ae6cfbd65e352b1dc2d2f16f2c7693b371687c30bddb7564ea243b0b2e37cb9
-
SSDEEP
3072:N/YN4lzHcuNoD6QUc/2kUHgpM8tN6zdAODBET5Pz9rf5y/:tz5ck4gCR68GZ1DBEZ9ty/
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mai.livewallpaper.kaleidoscopelite -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mai.livewallpaper.kaleidoscopelite