Analysis
-
max time kernel
63s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
21-09-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
f02a94c4daaf0799ecb061db755909c7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f02a94c4daaf0799ecb061db755909c7_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f02a94c4daaf0799ecb061db755909c7_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f02a94c4daaf0799ecb061db755909c7_JaffaCakes118.apk
-
Size
572KB
-
MD5
f02a94c4daaf0799ecb061db755909c7
-
SHA1
6c5e5aee34ae14857327967e27b6663a1e59089e
-
SHA256
f3bd68a06f227ad7c540323b2945ca8fb1b3d1b2b37d6907cc9e2cea0f448cb7
-
SHA512
913f86f0c00f1ffbf0c34646e4636d014d0731db22fca40cee08112be0638dd8b3eece3a73081f9299169ec12bfc8c483682cba326f8e02c47357f936e98aa8f
-
SSDEEP
12288:ZOn8HMj2KS2g7sD5uGuBOGnkWV3RJ8I2JwZqv7OI2JwZcrmwi:Q8sjk2N/uBOjSRWI2JwkiI2Jwii
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ishow.dhbdqw51 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.ishow.dhbdqw51 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ishow.dhbdqw51 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ishow.dhbdqw51 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ishow.dhbdqw51 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ishow.dhbdqw51 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ishow.dhbdqw51
Processes
-
com.ishow.dhbdqw511⤵
- Obtains sensitive information copied to the device clipboard
- Requests cell location
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4960