Analysis
-
max time kernel
47s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
12/09/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
dbd3360d32ef7b81d583f30566cfabbf_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dbd3360d32ef7b81d583f30566cfabbf_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
dbd3360d32ef7b81d583f30566cfabbf_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
dbd3360d32ef7b81d583f30566cfabbf_JaffaCakes118.apk
-
Size
14.8MB
-
MD5
dbd3360d32ef7b81d583f30566cfabbf
-
SHA1
17eaa2c0997e4121577ee6a58154a27ac0e77860
-
SHA256
a1b847bebc3bc93ceea241dd689ffa12114367b59ccd4ba6721842bf401bd1ce
-
SHA512
ef6aad924fe9ab09371cb065bbc4cb9ad1e60f9e5cd2ae4bb01699523a7859a0684a075d9b734ff2d295b9ee7070c0109334aa7d17911c8e8fdb4d95826584a6
-
SSDEEP
393216:0QtBWdiQtBWdOQtBWdUQtBWdNQtBWdXQtBWd9:H+D+v+R+0+G+f
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.real.real -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.real.real -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.real.real -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.real.real -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.real.real