Analysis
-
max time kernel
2s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
10/12/2024, 06:44
General
-
Target
dd7d432730e9dd82aff36c4e3db4b75b_JaffaCakes118.apk
-
Size
6.7MB
-
MD5
dd7d432730e9dd82aff36c4e3db4b75b
-
SHA1
00b0683b456045ce6b8a264ede080f7b407c2679
-
SHA256
f91e6c85fef73aebc7eb73edee75e96376618522a7bf0df952ac9087bc17782b
-
SHA512
62841fd1fb3de9ec9ba93dd455b931d270b884591ffdf5998edfc6e3672aef01cbdd88ee79dd77bc644eef2d907e55a7d3e636d18b91044cbeee93356df98606
-
SSDEEP
196608:uyxLsXOld+G3Hr0/v42DYPNcCx6NHUlpTAq1qqAzVGkxWR:uxOlLXOv48Ylcojste
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mm.doudizhu.zx1 -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.mm.doudizhu.zx1