Analysis
-
max time kernel
62s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
17/06/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
b66b0247e9e3b47952002ecb34564b5e_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
b66b0247e9e3b47952002ecb34564b5e_JaffaCakes118.apk
-
Size
2.7MB
-
MD5
b66b0247e9e3b47952002ecb34564b5e
-
SHA1
209157686966487471e9d20af9214d97a858d9ff
-
SHA256
b5f543fdf74e6d0b3fc45586843db4b481fd733415845aabb777b8a1c3941307
-
SHA512
e7eff99fcb674214022ef76b637e5fd55410fdb2391ec9ab73f33825fc47723fbe6463a7b40ecfed0e02923ad3320352b432a71871134bd83847b0a53bbe2ae2
-
SSDEEP
49152:oG3jXbqLV6kE3GUpatsnAOoEQOdT7o7Em1IcaOVmE8LuoNMlAb7AzQzJlhmG4W9/:oG3jmLV6ItsnAOoql7AlCc9VoLuoqlAD
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.higka.i2048a -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.higka.i2048a -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.higka.i2048a -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.higka.i2048a