Analysis

  • max time kernel
    2s
  • max time network
    130s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17/10/2024, 16:50

General

  • Target

    52b39d6d8a0646f86edce48a01638d13_JaffaCakes118.apk

  • Size

    6.6MB

  • MD5

    52b39d6d8a0646f86edce48a01638d13

  • SHA1

    3dc1f330a4c74135c620388a2c738a2fd1f6e442

  • SHA256

    080b797741cb49cf3e45e9df7c3b03f4e1e2b7ba377a0077b09a3bf004d72e13

  • SHA512

    069a47d0382a8dd0e07a821196db331ed25dc235d3a9365074d08efcef46024b52c13248c7ea51fc24ecb202f0a570a667acf6b45eeb3a155dd18a83d37dad12

  • SSDEEP

    196608:TkxLAXOcd+G/Mr7/vXdkYPNORIwNiUGyuCGq1qoKik:TvOcLEHvXOYlOxzm

Score
7/10

Malware Config

Signatures

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs

Processes

  • com.mm.doudizhu.bdssb
    1⤵
    • Queries information about running processes on the device
    • Listens for changes in the sensor environment (might be used to detect emulation)
    PID:4211

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads