Analysis
-
max time kernel
125s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
10-10-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
302e4a471bef588aecd4b30e259072cd_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
302e4a471bef588aecd4b30e259072cd_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
302e4a471bef588aecd4b30e259072cd_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
302e4a471bef588aecd4b30e259072cd_JaffaCakes118.apk
-
Size
190KB
-
MD5
302e4a471bef588aecd4b30e259072cd
-
SHA1
80f6207bf8d91d80c303718902ae444ba5499399
-
SHA256
6416c53a10a95cb37ecee748836c7e933b861b4a0e51c48711b9f420ae7a324c
-
SHA512
6ac563788e4fcc69683d8a28ffa62d9e63da7656628eb05841d6fcee6a4b7042391b4c02baf5eb4065cb9e18dfacdcd950b52b9d21f2869ec32d22b779ccb498
-
SSDEEP
3072:6ZtbOdV8GSR9T+KqPC5+kAMEJG8G/GF17IctXT+H/xCmMeUZzUwzMToTevfsaH:ebOdCRYKVfF86G1ttXafcRzUwgTie0S
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ekdrjuhjaih.qyofplge -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ekdrjuhjaih.qyofplge -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal ekdrjuhjaih.qyofplge -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ekdrjuhjaih.qyofplge -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ekdrjuhjaih.qyofplge
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD572793b9c10f4c4746e23ec76fcf00f4a
SHA12268f65d6bbb2223acc55ce9b2d9c4a2aa63d204
SHA256e25abb98cfda8f23a77a4cacd02c89b435eea88532fcdf4e2c271e1cdb7ca346
SHA5125ac1540ff945ad2fbc22b89482ebf808ef2768fe051df81e8d78c24af11510f49164eb2f5efd3abe6058a1ed1bfcfa6915e7b77394ffa1be0ebfbcbb3ae4c395
-
Filesize
144B
MD55c48daf71dc5ebbfab42d6a0e3500fe4
SHA13c67b4ae0290253728958b902abb1685252fd81d
SHA256fd4351bd874d69f2b90bdd932330f4714872109a4cab952ebea0b3f9f0482435
SHA512b50f1f3f60d7e191df03fa9f30968d2f8588ec7a7b54a7cda4b431abf5a68a5cd84e11f31b4309bc113fd585b818a7a32ef7a8a16bc396d62060427724ac14c8
-
Filesize
192B
MD58cfdb8e08ca50882eb6e8c3aeab3c047
SHA1044e52cf7a453292716351208443a3d19486cba6
SHA256d98f53aa3cc5554851099aa88719189216e79ab36618020c29148f536ec325eb
SHA5126e5b82102d6d5b1d708c08f2a3b8f34a9ecd727711ffefafd747d4504ba36870bbc137ffff1e30b5efcfbf7489f2675287fa3619b315933d39c7afec94393ae0
-
Filesize
240B
MD545df8a4770414b316dea83b9875aea0d
SHA1ee9743fb12de2342f97a88177281ced290079bce
SHA2560795bb6a05c3ccde70ef2d6ceec1b1b3dc736c3d11824de144125876a44b14e7
SHA512b4e0b513091ffad98b4c7b4b45fb885e10922f2be758f62dc87b3e8c9db1f6122ea9a11a13cd24627a8e2431fa20bb036b40a4029b155a82707ffba3601531a8
-
Filesize
288B
MD5a46c503bfb0904d0c4f16a76682397b7
SHA190fcfef2a6aed58ca71af8dde6657b2188b4e388
SHA25668a1bedde14a576d9762f0a86183315d6c444ea4e8a4bee71bd00f5d512365ea
SHA5124a6286ae323bb893250358f1f8ca073d225c663cbc2e22b99005f391050a40db5a26b4f20d208d254ec4210a012a386470fbc5fd85117155da1129ee236371ec
-
Filesize
400B
MD502cbe09e958be084345afc6982a6f6b4
SHA1a8df3461f6812219f713cb1e83dfd965adc672aa
SHA2567949dbc9a8350c91095f9233a5984b185d8d76c6fb655f012533805080a51ce1
SHA512706607195b90d54ad3bacb8943c4a00030950b708416ceb01b72bb809d21c147ea08cc729aa82f73ce7cb76642dea9a86085c42bafc33c000a227fc6b0a7c22f