Analysis
-
max time kernel
24s -
max time network
130s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25-08-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
c0cfdf18b4670edaca2db15601c2c1fe_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c0cfdf18b4670edaca2db15601c2c1fe_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c0cfdf18b4670edaca2db15601c2c1fe_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c0cfdf18b4670edaca2db15601c2c1fe_JaffaCakes118.apk
-
Size
2.0MB
-
MD5
c0cfdf18b4670edaca2db15601c2c1fe
-
SHA1
47a32a5220a9ad41aaedc6cc50006542e673cfea
-
SHA256
bc057f0bae84d48e79944eb98154795acef33f5e6670766227eb68cc73a3cdeb
-
SHA512
a867c897f2d62db70d73da605525398222c00092e8d224047bd53bc8199fc33de0e75a9523f59b4095722a1c7132b9ad7a285b4748cfe7a22243273d696d238a
-
SSDEEP
49152:U+7zCZ5clmITPhMFB50QfFYAYtYj73ZTe:i69eL51e7uQ
Malware Config
Signatures
-
pid Process 4448 com.aim.racing.hack -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.aim.racing.hack -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.aim.racing.hack -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.aim.racing.hack -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.aim.racing.hack
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD558c0b6e45328752b20ac6e719ac034f8
SHA1372b2638afd00bbbc4034657b3df3d2e428fb367
SHA2569d74f93afa5a179b1ba2f19f154b2880aa8b99c88209802099045a0874d2426a
SHA5122d347d5824b9ab701e341c89e8327a95fd6bab8e92ee15ce9550da368d773e22bff304072a4854df5ab763750a7401f7aa61a49e3292d62c27fa9f20536eb3ab
-
Filesize
16KB
MD5f7c9ca5443e6106a5c12d77fecde1ca4
SHA17e5979cd153617e788be0b31a3a12708f15431ff
SHA256bff81e151c8301a13337a4bd5f7cb4401adf4802df056f20a21b47bb69e372d1
SHA51265d30c803d5fa4636bc40ad9f7ef2f30e42cfc7a997c8db43c825b05218ee19de66160487334c4c067505503ace7e5f3a2c49d08f3b65dd0b15cb242fb4b37f2
-
Filesize
512B
MD5151c16157353fa37db606cdf65303739
SHA14ae0f1bd2ac4df161479f9895984a1e7235e94f7
SHA2564383c307e76e740017279d494fd0df1b97bcad14e524317c537dd17fca5df152
SHA512ade3119d503d95e00757dce2f5a1971f4e97673dbd6e954c27db412080b81dd8536d30ea0dbe53cdbf5bdf99485d3bb1c47e32edf3603a2ba45056a52ae9c6c3
-
Filesize
8KB
MD5c5a74fa8f08e49b788654ff292431c8d
SHA1cafa65a1461f4fec8ecdd7ac7e1ab337036adfff
SHA256ff5807ebc991c2854ec70be05855a8f17fce370c42a56d4a2024a7dd6abd7313
SHA5120cb75e2b6a361b06f73e9466a886220e4fe85c87dd0b74e3c76c9d670b54b1007764b1a6175808e4c8ba42274fa63edb2d3906d8ca08d75c2869253d307e73ca
-
Filesize
8KB
MD52cf84ffd1fcaf3edfcb7cee98f1a667e
SHA1fe8224f512556e2b6997489c4ac9673fc66002b2
SHA25622a44f4c9d4b12d8c383111730a06c2b25b919d6074b521b92deab5f732add3d
SHA5120895bdb0367ae66cbfcdb40b1d3433faa49d039b0e1dee61190020c5c2d9c758931ba31d9d551f3bb7490722deed5a07ac6900ce19f2a5ef2a71de139593031f
-
Filesize
8KB
MD569506c4bd3d3ab38719ce05c9c798a1b
SHA1cd0994ad3365e11a5743b4dee8ed1ea9963aa9af
SHA256a77da57cdb68311ee2d8d8f9501fb91343be1056e3ecf1881199a3b03e5b3640
SHA512cbe0afc61c9f6d1b057942e9906a03185c000ca9eee2d8a9b6dd716ef542cdfde02bf778c3080dd495db65aa57a5dd06686b9f1e17dfb640f8d260b4dd3e53c0