Analysis
-
max time kernel
47s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
10-10-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
-
Size
414KB
-
MD5
300657b7aefe5f16c0965db7f513b614
-
SHA1
51fa80da66f9becebf260aef129720d97f65cc40
-
SHA256
ad17e04f28686d7723709feeb9838403bd0368a1920c0cde783433245904f63e
-
SHA512
83f201360a35d74af4aaf703d778ea0e12199ab9faf60ac69b2e32010a3b618d73da186d6a1ba23f69d724f903e1d7095135328d4f5248d6dd730f2de6cf4360
-
SSDEEP
6144:aKK4Dk6lWhLteyS8pFkcuNFcUXKyfZywwPcKUGR4C9n3T947D8R7M9ji:gedlWveyJH8XXHZW1UM9T9+qM9ji
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ww.navycsu.mogo.youdaofanyi8 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ww.navycsu.mogo.youdaofanyi8 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo ww.navycsu.mogo.youdaofanyi8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone ww.navycsu.mogo.youdaofanyi8 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver ww.navycsu.mogo.youdaofanyi8 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ww.navycsu.mogo.youdaofanyi8 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ww.navycsu.mogo.youdaofanyi8
Processes
-
ww.navycsu.mogo.youdaofanyi81⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4968
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD502875778fe94ab12c278b785ed27e033
SHA1d6c0c89fd4f84581cdfa36f78d19a493f8e82353
SHA256bbf0ac2410030c4466bb0d5fb1e19fa8bc5d8bafe1b590f2230b96eb8eb37ea4
SHA512187b3902296903cb164a517c73bb8a1bae0b500c002144a6952552edbea09bfc2dc075525fed6dc3d1164cf67781aaf8f96ccf85d4f90d7dd8bd283e43ccedda
-
Filesize
16KB
MD578a23e0090a5fbeec5e856a5c6639001
SHA151982aa20577d26a06c86d2918953b5b5e8b9782
SHA256a14f58ea8c23b7d59fc33477cb2c421468440640856e903d2a172bca7682e3d5
SHA512f829082b7558e9a1c1d6713dd6f110117136703f960a229fa49f4ca9f34ace6bedff8ae2e6cfdb6426dec301c70f46e7d8ab5f5877c078a57edd30f4380555c4
-
Filesize
512B
MD5efa545d3f01fd1a290215adee5c92691
SHA141820c49505761ac2c22e0c2081f7513111522c4
SHA256bd7dab580b5dd3558f42a87f4f37201723e9b62d86de1869b883417215b4fea3
SHA512e4096ca5bd71b148148adfe35c31afb69a2e20f5b7b7959a3bf3115d53d89cdcc4c3b17ceb7ad7fd7371482147431990e7bd8e90e7344ce401bb8a268805328c
-
Filesize
8KB
MD5211afd1a5b5d1bfe5567832a435b766c
SHA163c31b0a47caff09a75efc0ab4b372287a9a771a
SHA256dcc8ea1fbff54d78f52538f085305e9008497e97fe8e7fbaa249dd3a39a4ff8a
SHA5128586546a8bf060330a033cfda59882b72e52645580f6fec3e59f297af5b656f9b963ef6e89f59473030b6ac9bb1995e3c229ba428dfd0380833d4498f71f63d0
-
Filesize
8KB
MD5961833a14de32a71a2b1e84c8f1aee9c
SHA15d97a12e8ef7784bca4a7c118c1e82e8f8547cf4
SHA25620450851511db07f9511c2d38769dabf49c40dc7f06ee9574c883cfd6fb326c0
SHA512ac8e865d76717980817f70f224023e4de52d82cd2cc33cc10d93225bf631553b7fa2a010016eeb9466bf9faca16d72b4142e85c4b6286579c38f370f5c183122
-
Filesize
8KB
MD5e2d004254dd40bae007d6a6f385dbf8d
SHA1b0ec2d2f6bd79caea9e53db82a87ab9f9636406e
SHA2567703da484e2b227430af488f051f3662274918a5be477908f734543c080997ed
SHA51238c8e6fcae5fe4d79cfb51f72830189f218b2ad05f714bca2787e86535e96e97ea3a30168978af4304b0b85ccc2813b9be0701cca0de4defb0b3daa1d246b310
-
Filesize
8KB
MD5442e43af683d13131032c25a61dab593
SHA19e7a49401807862e114f3f290e327016c832b2b8
SHA256d7df33a8610be5c4479e71283bacc562379c144d6ee567904a3128ffead872d8
SHA51237ddf20e18a3a7df307f60f2932153f2463e347efa529cae6b11d68f6a8597987233a97d882b16d423b45270fe568cc68694dd920ed0ad992276ff9ca85d9273