Analysis

  • max time kernel
    47s
  • max time network
    137s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    15-06-2024 08:15

General

  • Target

    ad7d06f3cd8c44a52217766edfc6a57d_JaffaCakes118.apk

  • Size

    12.3MB

  • MD5

    ad7d06f3cd8c44a52217766edfc6a57d

  • SHA1

    b632bada017c29f246415ab0e133ffb28592ecb2

  • SHA256

    4de5a6fb60616fad7afb5baf3b6e2aafc2bd4db07394f828780e4e79cf566594

  • SHA512

    9a7e60d50c9d65df4cd3eba26a2c667ef27c56b11999c6dc5ae8b3efb9f77455e65845347c7077a8965f86b8027a05861cfacdab3e9d8eebae9c48130e4e539e

  • SSDEEP

    196608:4IAk7nQtr7BWdJIAk7nQtr7BWd3IAk7nQtr7BWdrIAk7nQtr7BWdOIAk7nQtr7B+:hQtBWdCQtBWdAQtBWdEQtBWd/QtBWd1

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zu.zu
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Checks CPU information
    • Checks memory information
    PID:4569

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads