Analysis
-
max time kernel
40s -
max time network
138s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
10-10-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
300657b7aefe5f16c0965db7f513b614_JaffaCakes118.apk
-
Size
414KB
-
MD5
300657b7aefe5f16c0965db7f513b614
-
SHA1
51fa80da66f9becebf260aef129720d97f65cc40
-
SHA256
ad17e04f28686d7723709feeb9838403bd0368a1920c0cde783433245904f63e
-
SHA512
83f201360a35d74af4aaf703d778ea0e12199ab9faf60ac69b2e32010a3b618d73da186d6a1ba23f69d724f903e1d7095135328d4f5248d6dd730f2de6cf4360
-
SSDEEP
6144:aKK4Dk6lWhLteyS8pFkcuNFcUXKyfZywwPcKUGR4C9n3T947D8R7M9ji:gedlWveyJH8XXHZW1UM9T9+qM9ji
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ww.navycsu.mogo.youdaofanyi8 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ww.navycsu.mogo.youdaofanyi8 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ww.navycsu.mogo.youdaofanyi8 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ww.navycsu.mogo.youdaofanyi8