Analysis
-
max time kernel
1s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
17/10/2024, 16:53
Static task
static1
General
-
Target
52b6db2c04a04e316c1aa8fee122e753_JaffaCakes118.apk
-
Size
4.6MB
-
MD5
52b6db2c04a04e316c1aa8fee122e753
-
SHA1
bf127b46d78dde2c86325939ebbd20ed187464e2
-
SHA256
a887f5a8629725f6c8704e0784be357fe2ff2e45900e0ac5ce8b652d7d813339
-
SHA512
8835f370a509e1472792c94ce3864d4955e5ce21819c8a78f2a442ef0f70c0ddc38614f87a82bfca5afddd0ea6b1d6f42661fdbaa6eecdd4e4dd295adcdced0c
-
SSDEEP
98304:w4UUDA6Rzp602VgHv/i1SW/1UEA8800ong5kdnhyQFTk9jEmEvOi:w47sU96cv/i1Sc9800ong5kdnhyF9w3
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /storage/emulated/0/Android/data/li/ci.zip 4220 com.android.amili -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.amili
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5b8c3d87fb67344cda23e9edc6e9e87a8
SHA175c8b016a0d10188eea4ac4cab45d371cdd377f4
SHA256849298ae09391e6f07f738c44d5d1e379f7b853b7bf70996096fe29ad3474bf7
SHA5127337f0c9d078e39a8b9c59115679491a913ae23a4d606bfa7962d25aa371cbc238bec926bcbccc45850de26888855d326fa893dcf32ccb57c39c7d56b8e3e94d
-
Filesize
2.1MB
MD5f67d9fa0dce06f29ecc5f0203b5d8bce
SHA1ee2bc5071821a9cc573f559c64d7eaf103befdf4
SHA256222b771e63a3360884cc59f544190d744177d1de6d8ed20ae13a6611bedbf5fc
SHA5121c144cd9081a59ab20c2acd147d08582efc78b303a75773e0bcf9b6c5436a43d2c8a44fdd19bf1fde62a0c0e3dda2feb4ef8f20f605987d343fedc6fddc46f0b