Malware Analysis Report

2025-01-19 05:43

Sample ID 210911-njvt8sbcg8
Target DHL98.apk
SHA256 34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c
Tags
obfuscation
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c

Threat Level: Likely malicious

The file DHL98.apk was found to be: Likely malicious.

Malicious Activity Summary

obfuscation

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-11 11:26

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-11 11:26

Reported

2021-09-11 11:28

Platform

android-x64-arm64

Max time kernel

3567115s

Max time network

148s

Command Line

com.dailyyoga.cn

Signatures

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.dailyyoga.cn

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:853 tcp
NL 216.58.208.100:443 udp
US 216.239.35.0:123 time.android.com udp
NL 142.250.179.170:443 udp
NL 142.250.179.170:443 udp
US 1.1.1.1:853 tcp
US 216.58.209.238:443 udp
US 1.1.1.1:853 tcp
US 142.251.36.35:443 udp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp

Files

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/tmp-base.apk.classes7453311479562503834.zip

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/shared_prefs/multidex.version.xml

MD5 cbe783c8c58c4efd9049410236e44f7c
SHA1 16c155e191a7c92787dad5c516f0dc238becb75a
SHA256 6e47ec6bb4e4c8a42253c4d32c91a8d3345b3fbfc019ca1d392090e6213f64b7
SHA512 b6f1318d9e93c95e421a1f239a32a360eeec19ff686ce1c4e6af6749e91aab19de5a4efa482ec2bb89d96443c0051f46941d774d58353e07db38b3fff11ca413

/data/user/0/com.dailyyoga.cn/shared_prefs/DHL Express Mobile.xml

MD5 f7e5f43a093276ac97ada842b771b539
SHA1 f5b8ba86b8bf07a2163c8a97e11f03e4dcc0b0d6
SHA256 5471348fde9bc73a1e6b2259554305dd7364dc7c487b8e807367d30537d94dbd
SHA512 d10f539f087021417b5b506b2b8db1de29b13bc21f5b0f5c9279c6ca6275a61752bd01093f1c2a7a2235a06880e4b82a523858db3b9edd977b6ce18cbd8a63e8