Analysis
-
max time kernel
4s -
max time network
141s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
10/05/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
3046bf53504b69ad01b2017e29f5dbf0_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
3046bf53504b69ad01b2017e29f5dbf0_JaffaCakes118.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
baselib.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral4
Sample
baselib.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral5
Sample
baselib.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
3046bf53504b69ad01b2017e29f5dbf0_JaffaCakes118.apk
-
Size
31.6MB
-
MD5
3046bf53504b69ad01b2017e29f5dbf0
-
SHA1
cf05ae3bea76b88f2a6d1b53262d416e1d4ed02f
-
SHA256
818f715919dfc5f67fe1e09d775d36e48c2b49af1080d4416baa895397e30421
-
SHA512
2e25c47a90d3064217193988041909ca6560f05d15969e5b39658e295871793cf782bc76fbc94146839492994d326063a02376921c1b60975442bdf6245efd2d
-
SSDEEP
786432:xBcR5mEJhw/J795Rg1v/yrx+46qEyUoAt90A07K5xBKV5cQ1a/:xWHLJWXzg1v/I+dcAKu5KV5cQa/
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses cn.mama.pregnant