Analysis
-
max time kernel
7s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
03-12-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
be4628b0307f24ec29985874a584b2e6_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
GameClean.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
deploy_plugin.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
deploy_plugin.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
deploy_plugin.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
deploy_plugin.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral7
Sample
deploy_plugin.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
GameClean.apk
-
Size
847KB
-
MD5
c54016cc1b7833103037164dda1e5e2f
-
SHA1
912f3a8f8a24ded19d71f72964497203aad242a9
-
SHA256
5181f375fa96e0a1ec08443fc8caa34456daa844f220f5ca868746f97f7f4941
-
SHA512
b355b33b744518af07217c02e19678c0e3e0024a8275108f0f8d67805cf2690f990f6f0c9ebeed6388032d4906085e96827bcf66300af7044e8da342c77d8d23
-
SSDEEP
12288:N3qAtqNQEUWuTW8HtVZw3XTH3DYKdZWzcrlyoR11WoQ70Ns2EloBs42yxojsn6:JJXlWGW8HLZwzUcV1W3gSloBs42djs6
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sohu.game.clean -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.sohu.game.clean -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo cat /proc/cpuinfo
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1013B
MD50a74f7b8d8b42b9ae0c21bcde1e7c9e1
SHA108f5508ff2346232f5c9e99d776d480fa0f55586
SHA256d8005415c2eb4016c6bb69cac3b47a3016c8f919ddc16a68017cc4232d346c53
SHA512eaac157e260d73cfc0deb5a758b10ac52d894d7b57d5c3c651c2623ad1b7f5f62c9fe649ee98c4a8ee2858cdce12934d818a8c4c79f10f12e63a5f22876e13da
-
Filesize
124KB
MD56b784e56b1f695399bf853cd14e73526
SHA1d0a6aff2f3f2c515af7ca643fa30c7c2fc445265
SHA2563ec1f9d73d13e495322f2bc2f4188d24fe2d81917c2b1446cdf39082e00cb568
SHA51224a2b464195193f730e88f275e95688addbef971ea7eb15bf031d4448a2d50be106954a0d8b56f8d7ec2f891391f3a56e3aa3de34b19cbf5febad2c8d18c7894
-
Filesize
5KB
MD56a5ea4c9928a97dff49558c819a1ccfd
SHA139f71691c37d73706977cdec95b583a43c8564fc
SHA2561817c67de3e067eeff79b736f078a48f206d2134545f474796e3ff48a106d38e
SHA512f4b3f727c5e4a297c310fa461c63c7839ca464713fa542a578f1cf1fd34240b4084c59265d4a259f74aa2b692e83ad5b71d64b402cf638d02aca1e8cd535585b
-
Filesize
1KB
MD5067cae2951622e882cb43b6f4780b0e3
SHA1aabdb50f893c3aae03e81261a0f02c1a047716f2
SHA256c849467bf375ea19fd95fb64dd10a257f7ff343648b797f1896b8149b38e20f5
SHA51236ac348de694b8cdf000c5f85e8da47137df1d9b8d95360863f8e4e2cdcf9055c4b37a616d2058d0f7fa64f2101cf0eddfadbad860f7663f59b244b109cf1bb3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
2KB
MD57d998c8011c6d88f3311f2778b53ce57
SHA1bfb8f80f466182aae06b886e90166e1084619141
SHA256126a9d48903a4884bea6ab75875c775bccbd43a168cff37f6f0f2588814779bf
SHA512037515949f696f91293c87ddbefa89789982a7a7532b8d9651f86309d54fd3bbda207d40f520fa5a39043c7d5167dff245184b4b02575c35677f813bd120f8c4