Analysis
-
max time kernel
47s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
19-09-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
eaad2062491a35f07928db7094034fb6_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
eaad2062491a35f07928db7094034fb6_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
eaad2062491a35f07928db7094034fb6_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
eaad2062491a35f07928db7094034fb6_JaffaCakes118.apk
-
Size
120KB
-
MD5
eaad2062491a35f07928db7094034fb6
-
SHA1
131fb32b4c7f1216ec9bb96d468fd82086b540f1
-
SHA256
85243a1ba10db9305642b9ff37f1665db89d6d2e3e5606673cae352610dd8f81
-
SHA512
2368cb94ee2590cd0d05fd60778cc60f68eb839e5d680b1139f487a577973b198ab41791fd28be4a9949de173d150d23f7a85077d9bb13f839c1001de92abd22
-
SSDEEP
3072:s705bSoXzEaqOEzxjNt5IZ5hnO3/8CMNGW:s7bDaGxHY5hnc/W
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener info.charter724.homa123_ir -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo info.charter724.homa123_ir -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo info.charter724.homa123_ir