Analysis

  • max time kernel
    38s
  • max time network
    145s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    02-10-2024 01:16

General

  • Target

    0836ecdb2fd907095258ad32d2106a41_JaffaCakes118.apk

  • Size

    11.9MB

  • MD5

    0836ecdb2fd907095258ad32d2106a41

  • SHA1

    e22f85d5d8eaa48dc404c8a71a787b6992b3222a

  • SHA256

    132b93bcd9ee444f0bd68dc7c8c7408e1b4441f6774a10747143123388f951d9

  • SHA512

    16138d70f19d0009b8ae41bde5c4799e560c6d3a19bcbdb3789cbcc07b8d7e9fbf3f6d4a17284afd980d9cc897181c6c7063e6510c125ab262f661af93d4bdbc

  • SSDEEP

    196608:H8Ib1RI15raimP1Ibqy5LEASqZTHg+o453iM+tponqufr+3FsTMmk6k2:L7I1BaimP1ZL45dquaF8

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Requests dangerous framework permissions 14 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • com.nd.android.pandatheme.p_shiguangrenran20161012
    1⤵
      PID:4655

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /storage/emulated/0/pandatheme/pandahome2.apk

      Filesize

      9.7MB

      MD5

      4d4a759871446a557d56560a5554a096

      SHA1

      2cec9b00c6c12fbae28028a17e54d0a63049d3c2

      SHA256

      abc5b401fbd50c7bf87f19bdb8b3fce936beb2000f88a3ba6a004c1a8be331b3

      SHA512

      12bf8bf71cff1c4a439e1b50a73e9f2da6a1efb5de306d9982d90a40c3e45f06071ce872da132dacd9b12b34466e8e1316e3a67aee90791fa7e40aeb272fa279