Analysis
-
max time kernel
17s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
08-09-2024 07:40
Behavioral task
behavioral1
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
-
Size
6.2MB
-
MD5
d3dd159ba0a7e87026b59af0811955f6
-
SHA1
d113da8200d83847810d384d9c284e8b9dcd9d71
-
SHA256
1e7842e24d20e00543d03d83e6f0eac33a37617879238ab6b40e75b3c79c421e
-
SHA512
d80355be57b6f2eeb93c74fc47f74406f05ccd0d137483a44b6b35e315f1ea66e7f077bacfccc0d56f81f1017b23afcb4a3bc8a420045c610eeb1eb943d8fab1
-
SSDEEP
98304:DVJ8/S4dIOCENjjhpS4Mx9AHe8ZvaTn9L3Q:hyNnhyTH8ZvaTn9Lg
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
net.dinglisch.android.taskermdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.dinglisch.android.taskerm -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
net.dinglisch.android.taskermdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone net.dinglisch.android.taskerm -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
net.dinglisch.android.taskermdescription ioc process Framework service call android.app.IActivityManager.registerReceiver net.dinglisch.android.taskerm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
net.dinglisch.android.taskermdescription ioc process Framework API call javax.crypto.Cipher.doFinal net.dinglisch.android.taskerm -
Checks CPU information 2 TTPs 1 IoCs
Processes:
net.dinglisch.android.taskermdescription ioc process File opened for read /proc/cpuinfo net.dinglisch.android.taskerm -
Checks memory information 2 TTPs 1 IoCs
Processes:
net.dinglisch.android.taskermdescription ioc process File opened for read /proc/meminfo net.dinglisch.android.taskerm
Processes
-
net.dinglisch.android.taskerm1⤵
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5158