Analysis

  • max time kernel
    164s
  • max time network
    138s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    14-06-2024 07:34

General

  • Target

    a88c1f0259e89dec3393889a98bbe869_JaffaCakes118.apk

  • Size

    17.2MB

  • MD5

    a88c1f0259e89dec3393889a98bbe869

  • SHA1

    3e0ab976ba4d025445bb5f098f7f5aab50a125f3

  • SHA256

    a09d1f55af8e0d4e95915819331f72e92cc0de189944da5fff8c8ad629f8f045

  • SHA512

    ada5e9d62e639e19f9d90bee181c1a07629dbcd09229a9ca60428fa9f7a8674309249bec073404bfaf4185a57a58590e32fd29f5203cee8c16a75667192ce8b6

  • SSDEEP

    393216:dQtBWdhQtBWdCQtBWdBQtBWd2QtBWd+QtBWdQQtBWdE:e+8+j+k+D+z+p+K

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zul.zu
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Checks CPU information
    • Checks memory information
    PID:4637

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads