Analysis
-
max time kernel
131s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
06-09-2024 14:59
Behavioral task
behavioral1
Sample
cfce562b7f86c4fc2a1847bc68179902_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
cfce562b7f86c4fc2a1847bc68179902_JaffaCakes118.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
cfce562b7f86c4fc2a1847bc68179902_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
cfce562b7f86c4fc2a1847bc68179902_JaffaCakes118.apk
-
Size
149KB
-
MD5
cfce562b7f86c4fc2a1847bc68179902
-
SHA1
bd996d2aec1e7c190d295d5854c9689a48ec0d64
-
SHA256
d4af5b9185cb51339bf0d67ab0035a60c90bd2432ef2803c0838e724e445877d
-
SHA512
c888700fa6fa8584b66ed23942a01a76e77d9411b73a503ad70735350cdbb45749a629458f79f534dce0f1e781a7fe15db60c116ba4effa8079c4b5db1f15415
-
SSDEEP
3072:aLUjIhrWr2vP86n5xtuOSzTL7M1cda6Ent2J3G9qj0BBvgv5cUs:aLUjIhCr2vP8qU5zWcdFS8EKv5rs
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener hulu.com.huluwww.streamtips.com -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo hulu.com.huluwww.streamtips.com -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo hulu.com.huluwww.streamtips.com -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo hulu.com.huluwww.streamtips.com