Analysis
-
max time kernel
48s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
15-06-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
ad7d06f3cd8c44a52217766edfc6a57d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ad7d06f3cd8c44a52217766edfc6a57d_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ad7d06f3cd8c44a52217766edfc6a57d_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
ad7d06f3cd8c44a52217766edfc6a57d_JaffaCakes118.apk
-
Size
12.3MB
-
MD5
ad7d06f3cd8c44a52217766edfc6a57d
-
SHA1
b632bada017c29f246415ab0e133ffb28592ecb2
-
SHA256
4de5a6fb60616fad7afb5baf3b6e2aafc2bd4db07394f828780e4e79cf566594
-
SHA512
9a7e60d50c9d65df4cd3eba26a2c667ef27c56b11999c6dc5ae8b3efb9f77455e65845347c7077a8965f86b8027a05861cfacdab3e9d8eebae9c48130e4e539e
-
SSDEEP
196608:4IAk7nQtr7BWdJIAk7nQtr7BWd3IAk7nQtr7BWdrIAk7nQtr7BWdOIAk7nQtr7B+:hQtBWdCQtBWdAQtBWdEQtBWd/QtBWd1
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.zu.zudescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.zu.zu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.zu.zudescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.zu.zu -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs