Analysis
-
max time kernel
2s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
17/10/2024, 16:50
General
-
Target
52b39d6d8a0646f86edce48a01638d13_JaffaCakes118.apk
-
Size
6.6MB
-
MD5
52b39d6d8a0646f86edce48a01638d13
-
SHA1
3dc1f330a4c74135c620388a2c738a2fd1f6e442
-
SHA256
080b797741cb49cf3e45e9df7c3b03f4e1e2b7ba377a0077b09a3bf004d72e13
-
SHA512
069a47d0382a8dd0e07a821196db331ed25dc235d3a9365074d08efcef46024b52c13248c7ea51fc24ecb202f0a570a667acf6b45eeb3a155dd18a83d37dad12
-
SSDEEP
196608:TkxLAXOcd+G/Mr7/vXdkYPNORIwNiUGyuCGq1qoKik:TvOcLEHvXOYlOxzm
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mm.doudizhu.bdssb -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.mm.doudizhu.bdssb