Analysis
-
max time kernel
25s -
max time network
151s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
09-10-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
2e50888619859c578de5aa71bbc90c1f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2e50888619859c578de5aa71bbc90c1f_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2e50888619859c578de5aa71bbc90c1f_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2e50888619859c578de5aa71bbc90c1f_JaffaCakes118.apk
-
Size
151KB
-
MD5
2e50888619859c578de5aa71bbc90c1f
-
SHA1
fd95044430d6a218a345e4e724cb5f89a1879925
-
SHA256
ec0b6905c089600f9bfc908cdecda77dc85517f8fa465e161b2e94eb21a1d073
-
SHA512
b976fe67b469a0deafec42e6a23657f67e7f07660049af38a47465c4ea8cedb4772e0f264f3f2a37ff2dd38e883cb9f31e1409f04c7521e8e2b7b141449bcc09
-
SSDEEP
3072:r/3WJA5ll7Qbss3V9SOkwm4iRLgiM7+tjCG9Wqr7GBm+e6UCYc1lB:D+eCbs6lk6acihtf97B+VUOH
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.free.appdownload -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.free.appdownload -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.free.appdownload -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.free.appdownload