Analysis
-
max time kernel
2s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
65dcb4917f171da21e4673a9add0e55b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
skin.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral6
Sample
skin.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral7
Sample
skin.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
65dcb4917f171da21e4673a9add0e55b_JaffaCakes118.apk
-
Size
30.4MB
-
MD5
65dcb4917f171da21e4673a9add0e55b
-
SHA1
d22aa0897b8d70522d44dd091505a7c6c45f692e
-
SHA256
38f254aebefd53bd13f520fd509058bd80edfdff557e1717c11aa5d22a04fe4a
-
SHA512
d04d86a40cd84ad858800e38736617ac9179e971f399ca582ef30f13f7f18100429c28ab0dd0d50dbfba5d31cce3b72c0f4ddd1d1d906758b522637dbe4f080a
-
SSDEEP
786432:phJnx5+kyBOt1TWZQowhqklzz1FgZQe5U/KL/O67E:pLx0AFWy6Uzz1Fbe5i6A
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.shuqi.controllerdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.shuqi.controller