Malware Analysis Report

2025-08-05 16:59

Sample ID 240108-d9h81saecj
Target 4a5875d98c36b0eafaa14614f9468fde
SHA256 3fe96b6357053007530021dd3c7dfcbf3031cb7559260a1ee3144921a9edb5fe
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

3fe96b6357053007530021dd3c7dfcbf3031cb7559260a1ee3144921a9edb5fe

Threat Level: Shows suspicious behavior

The file 4a5875d98c36b0eafaa14614f9468fde was found to be: Shows suspicious behavior.

Malicious Activity Summary


Loads dropped Dex/Jar

Requests dangerous framework permissions

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-08 03:42

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-08 03:42

Reported

2024-01-08 03:45

Platform

android-x64-20231215-en

Max time kernel

3878360s

Max time network

158s

Command Line

com.droidstudio.game.devil2mis

Signatures

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.droidstudio.game.devil2mis/cache/ads2165568600486188699.jar N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.droidstudio.game.devil2mis

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 gamead.unityplay.com udp
US 1.1.1.1:53 media.admob.com udp
BE 108.177.15.102:80 media.admob.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
GB 172.217.169.46:443 tcp
GB 142.250.200.2:443 tcp
FR 216.58.201.100:443 tcp
FR 216.58.201.100:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp

Files

/storage/emulated/0/.droidga/gad_install

MD5 d7a16faca23cf2c7aa088cf40956babb
SHA1 e712e3f5e172e8b4e493f296b771c0093eef8a31
SHA256 c6a9cfaf5d9fdeb21b4ecda1566b26d4f544818bb43e0c7b07e9e0b5ac1282dc
SHA512 5cb51ed060a3650c1a1dcac8396ae27a27b4e4dde8b87bf4580a876e09bc5b3f3257fab676b90c4beba2c97489e17f1ff4388c265d084228c27f433964a08432

/data/data/com.droidstudio.game.devil2mis/cache/ads2165568600486188699.jar

MD5 a3c91df776658e58231bfe1c6c169340
SHA1 72377f7a42246b31303dde957ba8d275649ddf13
SHA256 67993815269ec28ffa3fb1fea66b6a0944892c743c93192c8fba614cead1bdac
SHA512 8d2aad144c96a0cdba6f107a16309592a23f1ce7b435a03e0080ed19d70730d0282e2fe3072744a4e316ecab919d24b6cc2216a0d381ac5de8928153aebb3c98

/data/user/0/com.droidstudio.game.devil2mis/cache/ads2165568600486188699.jar

MD5 12670a32ad1380c9021a9e74aa5f2281
SHA1 7e8caf0c7a4d78452efb90958e8ce1aae5148e44
SHA256 f3c142f78cadcb57d7da3d8e4dc5f8c7b05377417c639059910696c844afc1f9
SHA512 1277dde373cab02d5df62732834adb79f8dbf1d1a9ac56b5b348e354317fadc24fe20b5ebdd1ecc28f8fc98dcdff807d2839bef75ef7d871e976e68a95851b06

Analysis: behavioral3

Detonation Overview

Submitted

2024-01-08 03:42

Reported

2024-01-08 03:45

Platform

android-x64-arm64-20231215-en

Max time kernel

3878377s

Max time network

161s

Command Line

com.droidstudio.game.devil2mis

Signatures

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.droidstudio.game.devil2mis/cache/ads7336279891417101993.jar N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.droidstudio.game.devil2mis

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.10:443 udp
GB 142.250.178.14:443 udp
GB 172.217.169.14:443 tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
US 1.1.1.1:53 gamead.unityplay.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 media.admob.com udp
BE 108.177.15.113:80 media.admob.com tcp
BE 108.177.15.113:80 media.admob.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.2:443 tcp

Files

/storage/emulated/0/.droidga/gad_install

MD5 d7a16faca23cf2c7aa088cf40956babb
SHA1 e712e3f5e172e8b4e493f296b771c0093eef8a31
SHA256 c6a9cfaf5d9fdeb21b4ecda1566b26d4f544818bb43e0c7b07e9e0b5ac1282dc
SHA512 5cb51ed060a3650c1a1dcac8396ae27a27b4e4dde8b87bf4580a876e09bc5b3f3257fab676b90c4beba2c97489e17f1ff4388c265d084228c27f433964a08432

/data/user/0/com.droidstudio.game.devil2mis/cache/ads7336279891417101993.jar

MD5 a3c91df776658e58231bfe1c6c169340
SHA1 72377f7a42246b31303dde957ba8d275649ddf13
SHA256 67993815269ec28ffa3fb1fea66b6a0944892c743c93192c8fba614cead1bdac
SHA512 8d2aad144c96a0cdba6f107a16309592a23f1ce7b435a03e0080ed19d70730d0282e2fe3072744a4e316ecab919d24b6cc2216a0d381ac5de8928153aebb3c98

/data/user/0/com.droidstudio.game.devil2mis/cache/ads7336279891417101993.jar

MD5 12670a32ad1380c9021a9e74aa5f2281
SHA1 7e8caf0c7a4d78452efb90958e8ce1aae5148e44
SHA256 f3c142f78cadcb57d7da3d8e4dc5f8c7b05377417c639059910696c844afc1f9
SHA512 1277dde373cab02d5df62732834adb79f8dbf1d1a9ac56b5b348e354317fadc24fe20b5ebdd1ecc28f8fc98dcdff807d2839bef75ef7d871e976e68a95851b06

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-08 03:42

Reported

2024-01-08 03:45

Platform

android-x86-arm-20231215-en

Max time kernel

3878345s

Max time network

130s

Command Line

com.droidstudio.game.devil2mis

Signatures

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar N/A N/A
N/A /data/user/0/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar N/A N/A

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.droidstudio.game.devil2mis

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar --output-vdex-fd=48 --oat-fd=56 --oat-location=/data/user/0/com.droidstudio.game.devil2mis/cache/oat/x86/ads1109697178134938363.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 gamead.unityplay.com udp
US 1.1.1.1:53 media.admob.com udp
BE 74.125.133.113:80 media.admob.com tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp

Files

/storage/emulated/0/.droidga/gad_install

MD5 d7a16faca23cf2c7aa088cf40956babb
SHA1 e712e3f5e172e8b4e493f296b771c0093eef8a31
SHA256 c6a9cfaf5d9fdeb21b4ecda1566b26d4f544818bb43e0c7b07e9e0b5ac1282dc
SHA512 5cb51ed060a3650c1a1dcac8396ae27a27b4e4dde8b87bf4580a876e09bc5b3f3257fab676b90c4beba2c97489e17f1ff4388c265d084228c27f433964a08432

/data/data/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar

MD5 12670a32ad1380c9021a9e74aa5f2281
SHA1 7e8caf0c7a4d78452efb90958e8ce1aae5148e44
SHA256 f3c142f78cadcb57d7da3d8e4dc5f8c7b05377417c639059910696c844afc1f9
SHA512 1277dde373cab02d5df62732834adb79f8dbf1d1a9ac56b5b348e354317fadc24fe20b5ebdd1ecc28f8fc98dcdff807d2839bef75ef7d871e976e68a95851b06

/data/user/0/com.droidstudio.game.devil2mis/cache/ads1109697178134938363.jar

MD5 6175efac331cdc88f352d62e1e1b596d
SHA1 d2e2e8ccdd8ca885dfa83f28208459ac60e9ec1a
SHA256 3d3736a254adb3086b9cb9017b52fc7dbcaba3043e284ebf90bf27c0fa6b74e3
SHA512 c5ba4e091370597ff6780beac694a37b1fd9400a21f20b5a388a62a04253054ed91ffb14d2e84c233b7e4760f6f92fa324a98b88cf90dd868b4ad7f6db3e49f8