Analysis
-
max time kernel
3s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240603-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240603-enlocale:en-usos:android-11-x64system -
submitted
10-06-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
9aedaa2e6f115e628a1b79f694b58b7b_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
qihoo_plugin_novel.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
qihoo_plugin_novel.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
qihoo_plugin_novel.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral5
Sample
qihoo_plugin_safebarcode.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral6
Sample
qihoo_plugin_safebarcode.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral7
Sample
qihoo_plugin_safebarcode.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
qihoo_plugin_novel.apk
-
Size
614KB
-
MD5
142a0df92ae5ac9869d5a299993fe420
-
SHA1
5605740cc594cbb6023d0d64046dac57fc595acd
-
SHA256
8e79c67df9eb1ad890d94f9e6529c3c16e1456f0343d16b6f4d9328bd4aed57b
-
SHA512
565ba8a72aa9057e235979254493d31676a9514c317f1a79ed1840cafeefd2487a30ff00114c7554419747d559910ada85a3bd96e5893d92652add7e53df286c
-
SSDEEP
12288:9DQmKSOoV6pd5BZqn5W+6b/6WrQvxjsXf6ORPojKw0grW:9DQmdV6p58ILb/yxjKfcj50YW
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses cn.qihoo.reader