Analysis
-
max time kernel
2s -
max time network
153s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29/09/2024, 20:13
Static task
static1
1 signatures
General
-
Target
ff4207d76c63e2e92ae9e592cc5f5d54_JaffaCakes118.apk
-
Size
2.2MB
-
MD5
ff4207d76c63e2e92ae9e592cc5f5d54
-
SHA1
c03aa0e3a037f2189be98107a61557c81f30b71b
-
SHA256
3e7f5bf25781f5a449bf28c77fbe8cc580f5a073e00941a862c68b9e3fbebf1a
-
SHA512
86f18a8eb4a8c44313df77d8600149752ba107c005b4eade4b421a3e28f51af131da87dd5701ddf34147729815509c1a51bda89999c4527ac5e15d3a55254ff0
-
SSDEEP
49152:qYVSsbXSsb0go7lFTRGBjZNBLXIZFVbBfnrco5JjcoYs1LDU:dS6XS60go7lFTRObpGV9fgcYgI
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.j1377430517.xcp