Analysis

  • max time kernel
    3s
  • max time network
    130s
  • platform
    android_x86
  • resource
    android-x86-arm-20240506-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system
  • submitted
    13/05/2024, 08:16

General

  • Target

    3e8827e9039a2b0973dc072b5603011e_JaffaCakes118.apk

  • Size

    8.2MB

  • MD5

    3e8827e9039a2b0973dc072b5603011e

  • SHA1

    6be82fbd55e8dde1b95a822387071717f5c707a7

  • SHA256

    a75f30e6840747fe603a7061cac4e68abe02f4d10f1bcd2825626690f3364bd5

  • SHA512

    2c8aa84c9331493e17be94d708f2c960b215793dd7ec89d021e35e713c59bf4d915357482200a7d7907e3a5cb951463bffa77ecdd2e1b8617fabfe6f50c3a619

  • SSDEEP

    196608:vNJjNBP40RJr+IB+akqMMlmwJ+CV/0ivx62L2I+hM:VJjTPFJruanMMlm++CueL2IH

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

Processes

  • com.lg.paokugogogo
    1⤵
    • Queries information about running processes on the device
    PID:4285

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.lg.paokugogogo/files/TDtcagent.db

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.lg.paokugogogo/files/TDtcagent.db-journal

    Filesize

    512B

    MD5

    dd4f8aae26d7e6117933f45ce7089579

    SHA1

    cb7229b170afff06b0a669111050922e50b7a0d3

    SHA256

    ebee7d6ad316f0147c9a025edd049c92dc34a00e7abe2ba8865dd9954fa5f5be

    SHA512

    37c0fa239a79c8501c005030daac10227b9e511cd2b34bd3b057b5e5580351c8a3f57053edcde8efc63b68004c84fad4d296f8157a780a47b623f0231f693585

  • /data/data/com.lg.paokugogogo/files/TDtcagent.db-wal

    Filesize

    48KB

    MD5

    0ee2f06e9e1db72ced89d3817bc1e2ff

    SHA1

    87f14e9febfe30b04af9effdbc9f8d7d7e43f08c

    SHA256

    3337cf25d2a0414ec4dfe35df22437c9e6d088c979c7fd4d2884fc71b6904029

    SHA512

    a7f8a64d31f349759fdc892e3b244798e60e4e879b8845ba6ea16237cce9affb7c8c8e349bf492a9c03df8cdc1ddbd9bb98d3e44e65fc93bd5e5fe2d9b9e11e0

  • /storage/emulated/0/ktplay/d

    Filesize

    42B

    MD5

    39bce714e3890b9b247307adb250d64e

    SHA1

    350fd0d7f999fd2e2a4c8b316930c6780d264a2f

    SHA256

    a59580f352cfd991e35ad70ef91af44fabeef488b009b1d20cc761046925e714

    SHA512

    b18d614a8f74d3ded9a4be29a643fe7c64d5f8f02456582fc0e33a36b68828b6fd5404155db445e63970cfe3d10cd761651d70b3fda5b3311bc6c914c08533e7