Analysis
-
max time kernel
7s -
max time network
133s -
platform
android_x64 -
resource
android-33-x64-arm64-20240611.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system -
submitted
18-06-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
bc888e0a545113b7caffd6affa1e2469_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bc888e0a545113b7caffd6affa1e2469_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
res.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
res.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
res.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
bc888e0a545113b7caffd6affa1e2469_JaffaCakes118.apk
-
Size
3.5MB
-
MD5
bc888e0a545113b7caffd6affa1e2469
-
SHA1
0fcb64d448b6925510f31b86f44324629e57f2a6
-
SHA256
f08c7ae8ab6150b3f98e27ee85b6565dc97f501692bb40351b4e52e7540b7425
-
SHA512
8329bcfa05b8f1791ea3bbf0a52f65e3777d29a14d0ab8e0616fd4450e3b29bcfe3115efe2f8d508f72be744e97e9db9fa2b5f136938e81282c38e78599e482e
-
SSDEEP
98304:dkZGAIpRy0kSkJp6Cbe4Xme4X9e4XPe4Xee4Xg:dkZGdXy0bJceFHGo
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ccmlmv.bt.qipadescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ccmlmv.bt.qipa -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.ccmlmv.bt.qipadescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ccmlmv.bt.qipa -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ccmlmv.bt.qipadescription ioc process File opened for read /proc/meminfo com.ccmlmv.bt.qipa
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aca65512d569ca12c1b925ad488c2f34
SHA1abd729c6c9de0980acc7f8d56fa2406ed75c9fc3
SHA256a2ae14f5152803f029295f0d53eac431a0e2a0f72b022774174fd3c3c3037a5b
SHA5123c3c7305cac5b73bdb9e2d03e2d4775368af2e89786554003c0f97eb128a5a4c74091b01ce2e7be8fe23c0d8148e6ab06e0a3571605260616bc7b5963cfe035f