Analysis
-
max time kernel
140s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
18-06-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
bb78acf53f8b67a05b1d5eba45f90df3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bb78acf53f8b67a05b1d5eba45f90df3_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
bb78acf53f8b67a05b1d5eba45f90df3_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
bb78acf53f8b67a05b1d5eba45f90df3_JaffaCakes118.apk
-
Size
1.7MB
-
MD5
bb78acf53f8b67a05b1d5eba45f90df3
-
SHA1
bbf9f9554d12d8fd12db4121df7359fe90b1ee91
-
SHA256
85b943c799ad24ae3f5c45184e96d7d90898e8f0980ee170c0ffa2e6b111ba86
-
SHA512
781583ddf2098bb6c3dc926a1ccaeab0a2ccb20d7ce6957ac335da30f4221e4975a6668aa04da8eb1295aaceb632d465666b123ead30e189d75300d8b9ff47a6
-
SSDEEP
24576:f3LOjySftBwaxy9/My1TR2fftBWAtmX9Xr0Lmp+E84vqLFUZFt/by7irwztun:vCjyOemy9UyH2dwpFgcdVYsTOh0
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.xywxzyb2.ucttxs01description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.xywxzyb2.ucttxs01 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.xywxzyb2.ucttxs01description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xywxzyb2.ucttxs01 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.xywxzyb2.ucttxs01description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xywxzyb2.ucttxs01 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.xywxzyb2.ucttxs01description ioc process Framework service call android.app.IActivityManager.registerReceiver com.xywxzyb2.ucttxs01 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.xywxzyb2.ucttxs01description ioc process Framework API call javax.crypto.Cipher.doFinal com.xywxzyb2.ucttxs01 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.xywxzyb2.ucttxs01description ioc process File opened for read /proc/meminfo com.xywxzyb2.ucttxs01
Processes
-
com.xywxzyb2.ucttxs011⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks memory information
PID:5004
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59543925c9ea1805a5f61a26a86725d4d
SHA1fd79a11506fc7726811e0830429dc248ee1ecd14
SHA256c2612ab5ad676d3a2d5e5c5dbdaf96d083cb63d53c824af8ea91f810c982eac5
SHA51221c0945aadf4b34bb0147dc7ec3b70ad40957fdb042f0f6ed52b9fa2c69d4662a4b05f4a29e792544ee773d8a854ebb75f598efce140b40d1afe58975770751e