Analysis
-
max time kernel
6s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19/09/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
ea8648ffcd4b1690907df7cc0ca96bfa_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cha.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
cha.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
cha.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral5
Sample
com.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral6
Sample
com.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral7
Sample
com.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
com42.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral9
Sample
com42.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral10
Sample
com42.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cha.apk
-
Size
76KB
-
MD5
d48d1590f246947f64581b37bd6b2b92
-
SHA1
1e6ce734ff1b1ffe27e8e8a8894a621eb4c7487e
-
SHA256
a9d29004ce7b52c1c27dd431cfbcb45c36ed5a9cc7287bb3247160c9114a8286
-
SHA512
fe170c67b1ca7555cd66c39bfab222f842777364a762241d43f1970ca0323784568c1bb7da3d15a888cfbeab0c538b856a8c0f52ccc9520605b5176495266ef7
-
SSDEEP
1536:pLUD/U74EXKlo5Mlbqok+0rDHZIbNzKJ5W0wcd1F:pL6/U0IKlYMsok+0PHZIhmXW0jd1F
Malware Config
Signatures
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.letang