Analysis
-
max time kernel
49s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
14-06-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
a92b93f69e0fecd84aca61229abb32b4_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a92b93f69e0fecd84aca61229abb32b4_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a92b93f69e0fecd84aca61229abb32b4_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a92b93f69e0fecd84aca61229abb32b4_JaffaCakes118.apk
-
Size
765KB
-
MD5
a92b93f69e0fecd84aca61229abb32b4
-
SHA1
05e982d1b9cc1a852534bf65db4ec45067316e25
-
SHA256
bebea5c3a250c005becf432455cabed3ed54e4c119bd08c958072a2ea4d0ba31
-
SHA512
980bb07699968e7e3bbb08a3078c42533bea64379ac2c4c51fddd280d7716e4bec249b300bc080718958748e4c2d18af2b9927d538805f68a70081a45dade432
-
SSDEEP
12288:3BwivDxMJdYb3xFA+eObx/5onRVqZhDW/8ab5mXXc1:3BtDxMJ4xFA+ecx/5A7eg8emXXc1
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock 1 IoCs
Processes:
com.eset.ems2.gpdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.eset.ems2.gp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.eset.ems2.gpdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.eset.ems2.gp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.eset.ems2.gpdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.eset.ems2.gp -
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.eset.ems2.gp1⤵
- Removes its main activity from the application launcher
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.eset.ems2.gp/files/IM.txtFilesize
9B
MD50c0390db15bb27327e483e7cf4c5fb28
SHA1116da3c298369ecd02ec2f6f3cf6657f53c0e12e
SHA2563ad4b9f10a42a96dd20aa0dfda9fd0690fb798fe4d87d8be3a45913abd4c7968
SHA512f76265ac90c343b0ee48da5a2774ce7ee6cf980588b7eb019278e570228eeaa238f20ed4d6232aa0e67f95d7f059c105670f3c17896c00e7e76d800e151e3ed3