Analysis
-
max time kernel
131s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-10-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
2eb245a2bff4ad71d17d0ca5ca01a831_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2eb245a2bff4ad71d17d0ca5ca01a831_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2eb245a2bff4ad71d17d0ca5ca01a831_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2eb245a2bff4ad71d17d0ca5ca01a831_JaffaCakes118.apk
-
Size
924KB
-
MD5
2eb245a2bff4ad71d17d0ca5ca01a831
-
SHA1
279bda74052bd23a6bc97c3e386344e6b53b78e5
-
SHA256
4e7ee805699dc791e88f56dafd35a9458377d6c1bf33b86eb41daba9ca93716b
-
SHA512
a0572575887b10a1050f5679b6a670c032214075245a1b63d899f4b9f1118822c0ba3eee8171a45b0b9d419b125e606e7da4665c77d4a871d8a9e865c19a6d73
-
SSDEEP
24576:IEjZJv66q+X1fKssz4+CWG+E20V2xK3PMO:IE6tcf9JEG+j0V2xST
Malware Config
Signatures
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.anroidstore.bongoballs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.anroidstore.bongoballs -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.anroidstore.bongoballs -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.anroidstore.bongoballs