Analysis
-
max time kernel
18s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
20-01-2025 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c91cba377e8bc1544fc8ab7296d357.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c91cba377e8bc1544fc8ab7296d357.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
JaffaCakes118_e2c91cba377e8bc1544fc8ab7296d357.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
JaffaCakes118_e2c91cba377e8bc1544fc8ab7296d357.apk
-
Size
294KB
-
MD5
e2c91cba377e8bc1544fc8ab7296d357
-
SHA1
1155a6fa95b250de968a86c3702af1c356b9a276
-
SHA256
28589587b682ff394bebf1bb545d1a6e68803a036868013f2754374ac72f91ce
-
SHA512
c8a454de4ebc3c01fb12ef0ecc9c62706fa11e098ad7eb150f737dd821ea1d8973c52ac334bb1c2dc8bbf94632921aecb3ef153bfb27e884fab037608267c469
-
SSDEEP
6144:EkHhHCH9H8HHpfFW/Tp/ezObGQmBPIFmBPIQmBPIumBPI8:vI8IqPIFqPIQqPIuqPI8
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener a.a -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone a.a -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver a.a -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo a.a -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo a.a