Analysis
-
max time kernel
1s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
12/09/2024, 05:23
Static task
static1
1 signatures
General
-
Target
dbe3169b28e466ff81a68477aaf29bcc_JaffaCakes118.apk
-
Size
29.4MB
-
MD5
dbe3169b28e466ff81a68477aaf29bcc
-
SHA1
a1981384547f9b7e56535c2c351a54a2e71952ac
-
SHA256
c0d2d6107e879ffb130d57afebe692c2d01edd79e1173d7fc468171782871f72
-
SHA512
a83f3aff02c717445a93552b8f1e81558f4931610cd2c1ff65bad281a5d14c04872ae4b9ab07a06f968ab51ee9439b5fbfa5c88c591c2108ea272a1cfcc88f26
-
SSDEEP
786432:kU5Ku1USM9sGe+d5dq1JRH73xLlBtKKAF4JhR9AF4JhGD:kUgu1Uz9sLU5dq1jbxLVlAW7AWa
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.mgtv.setting -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mgtv.setting