Resubmissions

30-10-2023 23:20

231030-3bjjkafe2x 1

30-10-2023 00:20

231030-am335abg38 10

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-x64-20231023.1-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231023.1-enlocale:en-usos:android-10-x64system
  • submitted
    30-10-2023 23:20

Errors

Reason
Payload did not run: unable to install sample: Error: Unable to open file: Defender detected and quarantined active 'Trojan:Java/Jaraut.B' in file 'sparkk.jar Consider using a file under /data/local/tmp/ Error: Can't open file: Defender detected and quarantined active 'Trojan:Java/Jaraut.B' in file 'sparkk.jar Exception occurred while executing: java.lang.IllegalArgumentException: Error: Can't open file: Defender detected and quarantined active 'Trojan:Java/Jaraut.B' in file 'sparkk.jar at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:461) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1060) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:169) at android.os.ShellCommand.exec(ShellCommand.java:104) at com.android.server.pm.PackageManagerService.onShellCommand(PackageManagerService.java:21729) at android.os.Binder.shellCommand(Binder.java:881) at android.os.Binder.onTransact(Binder.java:765) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4860) at com.android.server.pm.PackageManagerService.onTransact(PackageManagerService.java:4014) at android.os.Binder.execTransactInternal(Binder.java:1021) at android.os.Binder.execTransact(Binder.java:994)

General

  • Target

    Defender detected and quarantined active 'Trojan:Java/Jaraut.B' in file 'sparkk.jar

  • Size

    1.0MB

  • MD5

    14c60d7c9ed65affcf0565ff94633a39

  • SHA1

    59b86277b79804fdefd7bfd68c63f9f3e44b2ad9

  • SHA256

    4fa8ab3763707bd8347f3a27faec2ac74f902af54b2074855eaf7410f9615874

  • SHA512

    bc4cd36959d714ffd1ca7a1668084117f8c0b053d0fb508f30675feb03730989fa1d63572a7fd2cfc76f99cf8d04329ee0bc8637dc9d1af3c4139400b46dad02

  • SSDEEP

    24576:8BysVM5qDErtZXREL9+9uohDNNNLIPNLI3NLIFNLIm:zqDytZh9uEZIPZI3ZIFZIm

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads