Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
179s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
15/06/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
ad0f597b399d63386605b15541cc6d93_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ad0f597b399d63386605b15541cc6d93_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ad0f597b399d63386605b15541cc6d93_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
ad0f597b399d63386605b15541cc6d93_JaffaCakes118.apk
-
Size
7.9MB
-
MD5
ad0f597b399d63386605b15541cc6d93
-
SHA1
5a46d9ab08d322053897654a91cd3964ecb363c1
-
SHA256
4b21f82f5c8f9b64de099faa770863ee3ad42592a388d0c6a395a30de1ee85c6
-
SHA512
f0d7a60fa8b5ca0ea65c60826bf3c68614340ad47aa90f8315bc684dff9620726cd7838e4290d6d15bcf844b463aaadc191dcca85f56142f2d08736dbc6f8261
-
SSDEEP
196608:eKxmBIJ5Myd3ZcDZHs5YNqJzDCj75gv0QX3:RIo5MEcDZHuYNqt2j7U0QX3
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.kairosoft.android.horse_ja -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo net.kairosoft.android.horse_ja -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo net.kairosoft.android.horse_ja -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone net.kairosoft.android.horse_ja -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver net.kairosoft.android.horse_ja -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo net.kairosoft.android.horse_ja
Processes
-
net.kairosoft.android.horse_ja1⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks memory information
PID:5002
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD599dee33de90b63d945b3d32d0dfea63f
SHA1ca2204612d825330c97f653e8583279f65e84fa2
SHA256df9b1adb1e0f611a1ef9f7fa2b0473638aed7695e5bf67081540a754c887be96
SHA51210578832634e68efa27f12f73bfdcf5b1e7194c7a93263471711449bd485a858ebc14f2a241dfa1267833eaf137a39098f7da96f5f0151e4c36f60ed17c4d5bb
-
Filesize
512B
MD5063904b26fa6faf340f92193f5d35a86
SHA1c45499e942af42705e478cd4ed68e9a4b5361e5b
SHA25683aec6facbdc9ab62b1d51e1ab66fa810f5623ad6ccabcf305e1880b823c4c22
SHA512ee6be386c818fe6ea6eb127273540c254cd97dc9ba685e59e938040205890297c80bea7af096ce959cbbfeff1eff207ce474f5c3adffd3e08617b397fdf92676
-
Filesize
8KB
MD5a1e5321dbe358a7cc7787cf6529efe17
SHA1c3e1220311b0fa940c7dc848aba6569f439d339d
SHA2569599593963a778cc3919c510f3d66758825e24c57e2ad55ce13a5dc1f5adbe74
SHA5121f57d77259dc99889ee052c4b4bf27dad33f461e78ae50291233b4200a6184fcb46f165afb77a6f3378311fbab12f9e6e8e9d184ea746ecb5f7239f05de5c1af
-
Filesize
8KB
MD54e7af5a914e7a40d9c44a5795295c02b
SHA18e5e236bc408c803d2e39bc46ab0dda4ce1a64e8
SHA256429d2c5cc8730b979e6c19c99a8ca664c81447d8cccf68517ee2720c2e36872b
SHA512dc23e0f1965af45cbe5e42f3219c6f2ff996ac1cb3811bd01f7bff4185a2e825b0cae80f886498b9633affac792cb608ff2546f1a8364a9e603bb7089f26e9f2
-
Filesize
8KB
MD5e3106a8464fed749bfda72336b8fd03b
SHA13a292dd8c166056f7d25fef575790313aaf06a79
SHA256508ec5508c436b9cabb523c5798d9e33ee46b5e676cef4675132dda185879068
SHA51259049443b6043fe95286393c222334be785ec7bc2c09fc856f8f7f72df4e9ed2b1f3604a821bbffee3291935282602c91d3dd8cf56244200f5bfe65ff9c1a16f
-
Filesize
16KB
MD52decc027d61e34f35329b264b713a25e
SHA10d6a97ad1e147ff5cb15d7bc50d016402720c2b1
SHA2567dd6f54b773436b58acc0b528fedba35d4a98f109c0d5de469f873418d13c567
SHA512e954c3182c9a19e912014c609366e3e69fb8e9c6a3f890762f0d00558da99a040e9f0e1908049ccd9cc7dd085e9dc51e0af2718cc1c8278118cb77facb0ac277
-
Filesize
512B
MD58947301b152041c954762f738cbe7bee
SHA1305d04c6bbf155bbe9378bb6cadf4ca798cefaef
SHA2568a4065e5bf76d68cd05d41dc4d6e5c6b2abdf33e1ddfc364bc9a54e1730d5551
SHA512fec6cf595505cf47d3aebd287e660cafe889ed694b3caf47e8b6c2662c67bf86d92c3b8dedd9fa2375432af385c651e098e394bc8da9df086716999f1277c88e
-
Filesize
8KB
MD58914631c7ab272fbf712b532198fab1b
SHA1356c0008dc44c7ae6862f29309fc665e18757d7f
SHA2560558c4e3c798056219cc7714d7f316eba83ba079b8b0ae349137d85f888dbec9
SHA512cbe81803b74a2246c7085415572e654f479055a9af818ceed849299f5635f1efdfccebb697cfcd4f39d0b3c76e4bc5be49d12fe4bf5edee6c0b090625c156249
-
Filesize
8KB
MD58affd996a6da06aa72fa81051b3c0027
SHA1013d60e1d1e38ecf0417c906a3900e6e895e178c
SHA25666b9e057f7d5afbce4c48ec52b4d2e1ef6951afae8b220e598bbfc80cc5503b1
SHA512489640c99107d5c7ec81238de7f3d7ef1e106a4a299d3505b647f4c31039ea3105255bdbb8070f2104d77805ecafdebeb54e34af0338d2389ff6eef11036201d