Analysis
-
max time kernel
143s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
29-11-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
-
Size
1.2MB
-
MD5
b11e7e40d2d41fd73dfe8bf4a4b640a2
-
SHA1
e666f0f5b4bc28fac6d2deb5c982036961696440
-
SHA256
e8671256db652571063e3d8a6e5df6645e0e4d77ed34454b0fbba65092d59bb9
-
SHA512
347da43684172cbae355c17b54c5eb8612a38a7b58add512ae347de77b7fb6492823da0f2638a065549c9b538f12e157b4d6e4e2bf2bd43ad7426101b2dcaecf
-
SSDEEP
24576:pNVdDF4EmyjWs8o9/yxNEZ/k9PKe18Ap+YhQ2ry+e12pBA2SmX5rmRtJx:pjQOKoMxNEZspK48BnxAf5rmRtP
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
toufa.sji.hxzioc pid Process /data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar 4515 toufa.sji.hxz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener toufa.sji.hxz -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults toufa.sji.hxz -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation toufa.sji.hxz -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo toufa.sji.hxz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo toufa.sji.hxz -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/cpuinfo toufa.sji.hxz -
Checks memory information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/meminfo toufa.sji.hxz
Processes
-
toufa.sji.hxz1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Checks CPU information
- Checks memory information
PID:4515
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5c601107d24f96646ae86f74b0fea880c
SHA18a8ce84fe5b6e186ddcd69c8757de4fb1aae7ed1
SHA256939120d702d97dc47c6963d98dc1d2694e0fae5f5d5199c0755f54741a3c2a16
SHA512b573a0d74ea8c6e99c3ebad4ac7b42ce46940231f8a90c9b19c887c6c20356235241068d187aab2bae9914c3df84cbe80bca13b5b6d070247353f5e5eb282f33
-
Filesize
114KB
MD52ad9fb4b2d9b333883b7e38f61c2fd2f
SHA15b85041452d173ed0d81d25b9ca78608a998e328
SHA256b9310a99f1b60959f6b725eea74623dc491adec55da740c17e8c7e02f35818f5
SHA5126fc04e1e22ebf8920b4928a8086cf3e0814d155f79f80d71622916f6a0911262382710e5ee2acea653db4b387730e201134592cb9992b14f3aef8b09d83bda90
-
Filesize
386B
MD5178e6322707e403bf374eaa6fc06d033
SHA1a71ea55d5de83f035c0fd603a06b00c3da1982af
SHA256e4dd90753f70e549b4214daa85e00f7d581b0529d572ce79685fa9b19a829bf5
SHA5127c1aa5b1de56a2fec7684a62b39b3178c35dc4afc360d95a280c8c6643c1d89f74e9702f88b393fab3d0702233563ec243ed9f3f85a1b206bd452ef2ecd52926