Analysis
-
max time kernel
2s -
max time network
136s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
15/10/2024, 08:56
General
-
Target
46dc32805278cff490d3a281ba4e5521_JaffaCakes118.apk
-
Size
6.7MB
-
MD5
46dc32805278cff490d3a281ba4e5521
-
SHA1
8ea1c2dda58ae1874f7c109b3405854c14e3778c
-
SHA256
edf56078102735a0009cd302b2953dc345056adac914bd152a447ae7a8104c1e
-
SHA512
fb04d715d3702c2e2ce04b31baf4667b2ed78c63550cbb3255bda5a3c19876065bd0b1920e292cb32c223a5aa88a3ffc40d92b33d5099363e7bf9123063464f7
-
SSDEEP
196608:HkxLgXOYd+GDErH/vzV0YPNKphEV6U2qstRlduq1qgiL+EY:HvOYL4rvziYlKdtTd3zf
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xxl.klddz.mx -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.xxl.klddz.mx