Analysis
-
max time kernel
161s -
max time network
182s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
18-05-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
534b15dad1d18772098addd79f3564b2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
534b15dad1d18772098addd79f3564b2_JaffaCakes118.apk
-
Size
1.9MB
-
MD5
534b15dad1d18772098addd79f3564b2
-
SHA1
1692f13a6419a8781f5feac5469ca91d7095efcf
-
SHA256
99682c4496bd9b11a8235ea3ad98c14609342e678a0626ced8fb17aaf4933dcd
-
SHA512
7a01133e9b745ef3cc1c676f5e2fa430ce83e567bf822d22570b20b3e0abe83701ee1cbe7b9f07a27fc9ae128c3a46283ef3c62ebaf659902cc5756508ffd6f3
-
SSDEEP
49152:fzHGezHGYvledkL+OPbT39AYG3pIwgjsrs/c4qCopdAbs2:fzmezmYvledmvpG3GFq4qCo/AN
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.my114.my114dgrenjia12010wapdescription ioc process File opened for read /proc/cpuinfo com.my114.my114dgrenjia12010wap -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.my114.my114dgrenjia12010wapdescription ioc process File opened for read /proc/meminfo com.my114.my114dgrenjia12010wap -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.my114.my114dgrenjia12010wapdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.my114.my114dgrenjia12010wap -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.my114.my114dgrenjia12010wapdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.my114.my114dgrenjia12010wap -
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 45 http://nxgamescorp.com/hyzx/13043.html