Analysis
-
max time kernel
21s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
08-09-2024 07:40
Behavioral task
behavioral1
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d3dd159ba0a7e87026b59af0811955f6_JaffaCakes118.apk
-
Size
6.2MB
-
MD5
d3dd159ba0a7e87026b59af0811955f6
-
SHA1
d113da8200d83847810d384d9c284e8b9dcd9d71
-
SHA256
1e7842e24d20e00543d03d83e6f0eac33a37617879238ab6b40e75b3c79c421e
-
SHA512
d80355be57b6f2eeb93c74fc47f74406f05ccd0d137483a44b6b35e315f1ea66e7f077bacfccc0d56f81f1017b23afcb4a3bc8a420045c610eeb1eb943d8fab1
-
SSDEEP
98304:DVJ8/S4dIOCENjjhpS4Mx9AHe8ZvaTn9L3Q:hyNnhyTH8ZvaTn9Lg
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.dinglisch.android.taskerm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal net.dinglisch.android.taskerm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo net.dinglisch.android.taskerm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo net.dinglisch.android.taskerm