Analysis

  • max time kernel
    5s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    17/10/2024, 18:16

General

  • Target

    530610bdc8ff48013317fefcf7876dc5_JaffaCakes118.apk

  • Size

    257KB

  • MD5

    530610bdc8ff48013317fefcf7876dc5

  • SHA1

    2e458e9d0f38707998f1d67fada9547ba9a3d023

  • SHA256

    70ea01d008463fb8cb32922eb46f7747ad8553bb0557e524ba9258388f6a3bde

  • SHA512

    1f0fb1606d3ada6d7857b248ad88b924d7597ea3aefe9abcde5255ba71e398a560c788ea3b1f9d5b787edee2d94c9e0bf58daa0a1f726398cf93dd8ad4b76a4b

  • SSDEEP

    6144:LFha3ha+mis4NbRG32tkrXwIJckat9SZEyEcAhBn+R9pxMN3oPa:Zhuho74tRGmerAIikQSZPxAj+xx4oPa

Score
7/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries information about active data network 1 TTPs 1 IoCs

Processes

  • com.eggplant.taskkiller
    1⤵
    • Queries information about running processes on the device
    • Queries information about active data network
    PID:4835

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /storage/emulated/0/Android/Package.dat

          Filesize

          21B

          MD5

          3cd41d0d27ed9183574f40035687778e

          SHA1

          1daf4833d59a6bfa10289c6b7c5f1b59f142f976

          SHA256

          4b4c83e907d6cf43ad55d20e9c0c435978ce6f5972de2b7b2e23e45972cbe733

          SHA512

          275e020e7b34039c96b3a843d6eb291fde320dc7ba0d8116ea7778db9209fc328976e1d2b8103629f330b55299d97785c5e25e347087547e154cc3371777ccc0