Analysis

  • max time kernel
    2s
  • max time network
    153s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    29/09/2024, 20:13

General

  • Target

    ff4207d76c63e2e92ae9e592cc5f5d54_JaffaCakes118.apk

  • Size

    2.2MB

  • MD5

    ff4207d76c63e2e92ae9e592cc5f5d54

  • SHA1

    c03aa0e3a037f2189be98107a61557c81f30b71b

  • SHA256

    3e7f5bf25781f5a449bf28c77fbe8cc580f5a073e00941a862c68b9e3fbebf1a

  • SHA512

    86f18a8eb4a8c44313df77d8600149752ba107c005b4eade4b421a3e28f51af131da87dd5701ddf34147729815509c1a51bda89999c4527ac5e15d3a55254ff0

  • SSDEEP

    49152:qYVSsbXSsb0go7lFTRGBjZNBLXIZFVbBfnrco5JjcoYs1LDU:dS6XS60go7lFTRObpGV9fgcYgI

Score
7/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

Processes

  • com.j1377430517.xcp
    1⤵
    • Queries information about running processes on the device
    PID:4249

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads