Analysis
-
max time kernel
84s -
max time network
144s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25-11-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
9e83e890c4b784e03ed5fdce762dd5b1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9e83e890c4b784e03ed5fdce762dd5b1_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
9e83e890c4b784e03ed5fdce762dd5b1_JaffaCakes118.apk
-
Size
20.2MB
-
MD5
9e83e890c4b784e03ed5fdce762dd5b1
-
SHA1
f8c8995cad9c5aadc74c635667d1963aea371460
-
SHA256
cd032577d1bbda5a9fd2c1b9e0a80157a604d2ece8397f5fa3cb3270115109df
-
SHA512
d657e4c5f8136bec6c70e278b792d8d3515c3d710e83527fdc65d206cbfee4b5daf116dc0868730edfe2029f31d9c8e8a87e68b157a4d118e17af1b7db506f6b
-
SSDEEP
393216:aabd63dLugs30flGcAxM//3PUHqK+JLBQzbiFAIWVRPwq5h908:aabd86gI0tGc4A/cKKbbcwrw+
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.aiiread.app -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.aiiread.app -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.aiiread.app -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.aiiread.app -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.aiiread.app -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.aiiread.app -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.aiiread.app
Processes
-
com.aiiread.app1⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4496
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5f54ff0d70a7da0af31f6fa9cc4846aa4
SHA1a1b4d570f5c5293045a19d0dc8ebd1d6377ab42d
SHA25635ed93432e0a075666209a20659d7b7dde80528693e9197aade109b54bf687a7
SHA5120aca9bf20759133ef793331385bba62764aa66b7e9f6583560dd7407462f4e2163dd697898048c97fbc627b478a14ed6a4344f7511b170cf7983507ecbe3e059
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
6KB
MD56501e0bb0f8e73e3355872692c30de14
SHA1f646d3dc40536c54905f5eb666d6ab36b0c05fa6
SHA256f32fad72a4162705c43c0e39346a6467cd48430cd805f910c057a390dd4f78f1
SHA51273c1ab52e1ec09b1d55c02252b222f54277e40267580e16fb19c338098ba43c9b5ce97740718d1ddc045e0d24370d588e8d3bef9b95c4eb47b083e467ba491f8
-
Filesize
335B
MD5585839d66722cfd02e40cb740cccb633
SHA1374c19200fee201b26d0153487a281a934615884
SHA25686a9bb4985cca6c9636c4fd071bef4b70ba7b3a5eb51af869a1299dc2b1574a8
SHA51209bbe1bf1455861fd4732f2d1945c84bac34090906ac2fab75d144c22ffcf6bc585c8209e94a2b1919c8402df53966081a1af2993e12261ae4c4ac5568667d88
-
Filesize
32B
MD584c27250fc3fabb12cc3ea14c00f826d
SHA1c015eac0161271cffc810c17cef4b5463882844f
SHA2566e89720d56286e87da733a7c081afc2697b1fb6f83f440805b80d90904bffa4a
SHA51286455c7997711d5fbcbb4a4722100518399a08f708cf573c15c28ce37b7271fbb9b990a0f0585df9847b4e49da78e6a34e51637079e94a21b94df9f7f4b13a55
-
Filesize
1.1MB
MD53de10b75b4fc0b3631db35fab5fccf44
SHA11fac1f9fd09533b3c8899cbbaa46f8ebc5766a56
SHA2566a543021b51ac4e9cabaaa69f61bb1b08c8fd8dab36463e07f832a5b29304378
SHA5127936bbc8bc52aca181e1e1816f28a4d4e7676054aedf0f3e22475e2aae4bda930cc4d32890b8eff652fb4f7bca9078420fc89b419c544163626733fa87932e1a