Analysis

  • max time kernel
    20s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    15-06-2024 09:17

General

  • Target

    adba00544293b894d6da2fa00f956bd7_JaffaCakes118.apk

  • Size

    693KB

  • MD5

    adba00544293b894d6da2fa00f956bd7

  • SHA1

    e0f5d147020941b34eca3bb17ae1d474ae2cda14

  • SHA256

    6f8a28b21360ca70500d83495b6e8275e0cd9275d59e129a132ef1baa024fb51

  • SHA512

    cf7e563671951c1b068dcb8277b16cfbb29722eabe15d27d8e72d7ef4556ff42a74f67d34f78c03fab722a88f46712542a0ee12bc136a909f0a117cff5e43e0e

  • SSDEEP

    12288:ND6oRHf0PrHJJnYF8tQCGxwEfvZbqpEDLSCwUjKaJEE1rIN0i/eD2Vn96TGjSqMJ:N7d0DH3YF8zGaE5bqpEDLkgKVE1r8tlc

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about active data network 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.colorme.game.duolamblq
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Queries information about active data network
    • Checks CPU information
    • Checks memory information
    PID:4477

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads