Analysis
-
max time kernel
3s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
27/05/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
7950e5c87808d172b70df529ed3a8a26_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
com.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
com.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
com.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
7950e5c87808d172b70df529ed3a8a26_JaffaCakes118.apk
-
Size
4.7MB
-
MD5
7950e5c87808d172b70df529ed3a8a26
-
SHA1
5e2aaa8c82eb977d5ee3cc136e6dd021aa08d483
-
SHA256
f32f7b88648f6244b91be7dd62875def19d04f9ac1c82d6beeec0a325a6e688e
-
SHA512
97604d44311f9926d7f62d280b226c4e3dd685ef9663b5f0349cafa5acfdc72ade5888ffae27c9d08b4ea06e37e7e288f26ba9f9d75c238aee1b8ed818c3dfad
-
SSDEEP
98304:NL3LZSBpDBdvc9alK1BjL4IZwZkaV011PUDD5ZjADn4FfYwM2cf3:1KBdvcQlK1JLZWZrMtw5ZjFfYl283
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.lbe.parallel.intl