Analysis
-
max time kernel
49s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
15-06-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
ada6f39b5eebcf2d173eaa9402e1309e_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ada6f39b5eebcf2d173eaa9402e1309e_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ada6f39b5eebcf2d173eaa9402e1309e_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
ada6f39b5eebcf2d173eaa9402e1309e_JaffaCakes118.apk
-
Size
260KB
-
MD5
ada6f39b5eebcf2d173eaa9402e1309e
-
SHA1
ef663d57f3bd3e1d15f4b7898f5923a9c9fe2451
-
SHA256
c25e7a0c7402359aed62c78fda1a639c245e88370d9c6f82a907447af3d0df4d
-
SHA512
5ae7063645796e5cd648d744c54640b8a4e5746e57ec22711b2f60ec73e207344c5d00238d27d8f37c9fd84241e331d793554e1c34313c18aed356bdbef17d7d
-
SSDEEP
6144:QSdbJWmP1rrouAg0kkIh4KtNnQovtNvVUCRax5+zUjqU3Prwj:QSBomP17nnQCxVUCUP+U9k
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs