Analysis
-
max time kernel
7s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
13-06-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
a5939a1124835d1d8430f9be3561b2e4_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a5939a1124835d1d8430f9be3561b2e4_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a5939a1124835d1d8430f9be3561b2e4_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a5939a1124835d1d8430f9be3561b2e4_JaffaCakes118.apk
-
Size
826KB
-
MD5
a5939a1124835d1d8430f9be3561b2e4
-
SHA1
ab275c1ef4be018ff83efd045f18f6c191368d18
-
SHA256
aec77d2ac31c45d755e65a7a0fa935a87a9f04c927a08d1f1f08c85bd7153695
-
SHA512
da382fcf6dfda7c5efea49ef56887bc8a9635c577d5c1d3ca8e71b28ab83ffef1961a24ce786137d9d2491d6fdaec6f89764ae4c23c32c95b90e1e02958bffaa
-
SSDEEP
12288:oon8d3NFhIZAfQsoXyZ6c0JAbJxdDyE3VIFFC1VFvZVo3IcCPk6DAYJynnWDK:BkwyF+20Jm5DPmaRZb/D/ynnWDK
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /sbin/su com.eliferun.sparklemusic /system/bin/su com.eliferun.sparklemusic -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.eliferun.sparklemusic -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 16 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.eliferun.sparklemusic -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.eliferun.sparklemusic -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.eliferun.sparklemusic -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.eliferun.sparklemusic -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.eliferun.sparklemusic
Processes
-
com.eliferun.sparklemusic1⤵
- Checks if the Android device is rooted.
- Obtains sensitive information copied to the device clipboard
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Checks CPU information
- Checks memory information
PID:4486