Analysis

  • max time kernel
    19s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    14-06-2024 02:23

General

  • Target

    a7b45215e47f59aed431530b78fd1174_JaffaCakes118.apk

  • Size

    4.2MB

  • MD5

    a7b45215e47f59aed431530b78fd1174

  • SHA1

    86feba93026996d9b023fe875d1003a4f48e6e9b

  • SHA256

    d20b81c48ef92ccd1874099d39fb25eeb8f3ac77c18ba72d0e151d693a44a49f

  • SHA512

    e270d847dfe84b414d0c306fd2ac9212076d89bb43d6c32a39e82fadb3ccfe6a92183ccae1584e0532425703c163e4ed42a64073615660bc22f594d269a6ec5a

  • SSDEEP

    98304:r/qvkUe2WSEWWY38D8Z9UScPl3b9htCsNmYkbzt:rCk7WWYsD8ZiSGWso

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.poisondartstudios.wonders
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Queries information about active data network
    • Checks CPU information
    • Checks memory information
    PID:4421

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads