Analysis

  • max time kernel
    2s
  • max time network
    136s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15/10/2024, 08:56

General

  • Target

    46dc32805278cff490d3a281ba4e5521_JaffaCakes118.apk

  • Size

    6.7MB

  • MD5

    46dc32805278cff490d3a281ba4e5521

  • SHA1

    8ea1c2dda58ae1874f7c109b3405854c14e3778c

  • SHA256

    edf56078102735a0009cd302b2953dc345056adac914bd152a447ae7a8104c1e

  • SHA512

    fb04d715d3702c2e2ce04b31baf4667b2ed78c63550cbb3255bda5a3c19876065bd0b1920e292cb32c223a5aa88a3ffc40d92b33d5099363e7bf9123063464f7

  • SSDEEP

    196608:HkxLgXOYd+GDErH/vzV0YPNKphEV6U2qstRlduq1qgiL+EY:HvOYL4rvziYlKdtTd3zf

Score
7/10

Malware Config

Signatures

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs

Processes

  • com.xxl.klddz.mx
    1⤵
    • Queries information about running processes on the device
    • Listens for changes in the sensor environment (might be used to detect emulation)
    PID:4216

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads