Analysis
-
max time kernel
20s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
18-06-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
bb876861f133a5ecd283d674933c796f_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bb876861f133a5ecd283d674933c796f_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
bb876861f133a5ecd283d674933c796f_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral4
Sample
GH.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral5
Sample
GH.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral6
Sample
GH.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
bb876861f133a5ecd283d674933c796f_JaffaCakes118.apk
-
Size
3.3MB
-
MD5
bb876861f133a5ecd283d674933c796f
-
SHA1
3e83583c20051226b2d28437ad7ef3f57302967b
-
SHA256
8dedafc31a1eb5c9597faa3e3a8ec898f11d12380c4f44b2494cf13211042585
-
SHA512
fe176ce590b9c52543a5cc251353a44da1a5ed361a7a7f41afc0a47e5153b1d56cfee881c73d1762a7a147b72cd153537623146616a4de598825aa3b5f861721
-
SSDEEP
49152:n5lxew23U66O1aju8OmIdT+HlBsN6eOWd4447Q4zgTg0AzA3Gdhz/qw2qdJH81WO:1e5aO4y8gdqHlM6qj40s0x365ndJ8WuV
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
mr.midlet.tafang1.gboxdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener mr.midlet.tafang1.gbox -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
mr.midlet.tafang1.gboxdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo mr.midlet.tafang1.gbox -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
mr.midlet.tafang1.gboxdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo mr.midlet.tafang1.gbox -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
mr.midlet.tafang1.gboxdescription ioc process Framework API call javax.crypto.Cipher.doFinal mr.midlet.tafang1.gbox -
Checks memory information 2 TTPs 1 IoCs
Processes:
mr.midlet.tafang1.gboxdescription ioc process File opened for read /proc/meminfo mr.midlet.tafang1.gbox
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5e77d0fa487941af4c6f30e324ec148ce
SHA1682cf6b142a5d61707f090ac85b017f9d60c8a18
SHA2566777782393d84399d1e6e2bd3a0bedd677566efc6b22609b81df9b35362f792e
SHA51258a6b12f493732706afd9a4e2863997aec67c2ffaaacea2e28ff247b794d58321f1a48697f4097a39d1e59c60b4790520847e13f75bde1b4937e982f3381e61b
-
Filesize
512B
MD59e4297f762a749e54e51c45738239916
SHA116459680394222465c2c079337c518e0fe2c4f64
SHA256f1ee8c08f17c7eedc3c8f449391e80147eb0471998fbf90bf75be1472ff835fa
SHA51266698cec1ae9a93193c701a7a55f1ef03fc2219b1238254ae3ed1a749ac6fe9f95d3d006eab51d4356df61bba70621f8a846345ee756f971718d1b926c1616f1
-
Filesize
8KB
MD5c8c1d96be636a3b50bf2efef888bef8e
SHA1e7d1ed2e00c5892d05488f2492c62c04b7a59a31
SHA256b43eafdc648f399ea7ddcb173acbbc09448ab8bcfb1b81ef01ee72be7ead3904
SHA512f21f7251d5cfc631170d8887c1f9427b8dc359562aa6ad5d6abc5d7252f9fdd69236a6162eb603431c6fa21576e6f259ba81a04c5b07d518ce946b796c2377d8
-
Filesize
8KB
MD592504e68f89d0ad9512063959fb71dd5
SHA1824b81bb3b8d3cc11ffe42055b3fb906da5fa0ec
SHA25611fe0a4a1fb76d89deefc108c53183c4990afd61a86c0503027e88810f375239
SHA51255e27be96321834a2411fb55334d3d72cc447456ca2d452b5816ea00b1d1237bb8d8e32956d2db396df7c54378a66c11732abc894536ff626b8a944f09706dc8
-
Filesize
12KB
MD530792c5f5df369f6c415e32fdccc0964
SHA104b7584bd45ad411ed39f13d5797dfdb0ef38fb5
SHA256832a5a7ca0e6437cc027503f253ad2b437ac5f223028c4a7465d2f744f3b6182
SHA5122eb98b90ecc75ef96893b0bf6fc765c768c75f0774a1427a179faf920d5e2d0160e829e1d854faf6b079b44fd92dc2d86c5c35d8ec965634570605dcd89ee88c