Analysis
-
max time kernel
3s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
16/06/2024, 20:22
General
-
Target
b50739b1edace484d46efc475bf575fe_JaffaCakes118.apk
-
Size
4.4MB
-
MD5
b50739b1edace484d46efc475bf575fe
-
SHA1
9ae8709c519b14226aef317cd5b05d2f345d70c4
-
SHA256
ab527e5908887a78f40b002141f96fad1dab1136d522149da985f18e75105bf9
-
SHA512
e30178abea26aa1e8b4d488b55f5d7c9c4ec2a779d5f635210f5a68ad5602654001b3fc1398aec9afdfc6b6f15d6371566d9859c5f1c391290e79701f28bbe2a
-
SSDEEP
98304:6JbHr9X/ATdo3xCsUaeKeI3VmgKcf3JF2Uvx5lWAE31wUOOSBRh2rXoB2WNI:6dB/qo3xrJrVmgKcf3JF2ux5kz96DJNI
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.RealRacing.bjwb767 -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.RealRacing.bjwb767