Malware Analysis Report

2025-01-19 05:34

Sample ID 240318-ma39ksec63
Target df43183e49f9fb1d48ca61401fa8a1498ede276ea32a02c42a1da02feb0e3357
SHA256 df43183e49f9fb1d48ca61401fa8a1498ede276ea32a02c42a1da02feb0e3357
Tags
evasion stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

df43183e49f9fb1d48ca61401fa8a1498ede276ea32a02c42a1da02feb0e3357

Threat Level: Likely malicious

The file df43183e49f9fb1d48ca61401fa8a1498ede276ea32a02c42a1da02feb0e3357 was found to be: Likely malicious.

Malicious Activity Summary

evasion stealth trojan

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-18 10:16

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-18 10:16

Reported

2024-03-18 10:19

Platform

android-x64-20240221-en

Max time kernel

31s

Max time network

165s

Command Line

jp.co.a_tm.android.plus_saboten_heart

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

jp.co.a_tm.android.plus_saboten_heart

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 142.250.200.34:443 googleads.g.doubleclick.net tcp
GB 142.250.200.34:443 googleads.g.doubleclick.net tcp
GB 142.250.200.34:443 googleads.g.doubleclick.net tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 172.217.169.78:443 tcp
GB 142.250.200.34:443 googleads.g.doubleclick.net tcp

Files

/data/data/jp.co.a_tm.android.plus_saboten_heart/files/swoyvNFMU

MD5 fc5b40a92e8b745f9c05786b49fa2d61
SHA1 4a527d14ce699472a550b5b99b67c51d0755c5df
SHA256 913974d90f7b523a138b9686270d76e14f658a3f2bb0e538af42f6204618dada
SHA512 b3ca7c223e7f090d8c5f5014a2c10608d78c27e6c938494fc6e86e81ffde48029f838fb3ca94e197a92b43a358964bbc22b3015d4d7ec7fb6b15e49d352db06c

/data/data/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 e8e0527a01aefdb89afd2c508f131da1
SHA1 f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256 f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512 fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 fde2ee00cbd121cfab5290b078aa3ceb
SHA1 e2b77d5320e155e413d040a8c20020962065b2f8
SHA256 2897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512 a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56

Analysis: behavioral3

Detonation Overview

Submitted

2024-03-18 10:16

Reported

2024-03-18 10:19

Platform

android-x64-arm64-20240221-en

Max time kernel

30s

Max time network

160s

Command Line

jp.co.a_tm.android.plus_saboten_heart

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

jp.co.a_tm.android.plus_saboten_heart

Network

Country Destination Domain Proto
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.179.234:443 udp
GB 172.217.169.46:443 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 216.58.213.2:443 googleads.g.doubleclick.net tcp
GB 216.58.213.2:443 googleads.g.doubleclick.net tcp
GB 216.58.213.2:443 googleads.g.doubleclick.net tcp
GB 216.58.212.228:443 tcp
GB 216.58.212.228:443 tcp
GB 142.250.180.2:443 tcp

Files

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/files/swoyvNFMU

MD5 66178a3e9d5928b06bfb41bf943ee73f
SHA1 abb61c5194ef08c47afc189775b5c7094d0d27f9
SHA256 048f7aace4dd52e1a98eb7388efaf8c89af99ed8df79a663b219083c0fbb123d
SHA512 129a0729e324bd5952853344c07fac968672830730386d8a8f947084f9606843535a99ebe0e5581a6f45953e484d2fc3366ec5a26ee387add7f652b00eaf003b

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/files/swoyvNFMU

MD5 f34b097a05623cb3bb6679f838f1f304
SHA1 df9d8ec42cd17f6fc9f75f20fa837c3a3d926014
SHA256 505c65feac24f7178d5de6644e315f133cddd10fb16c191c140b36a8c0161604
SHA512 d9c7adaa414629c6d96de5d70f0479a5bc4f1d9808f65d3ebc86d0c0ee5cc27afc0853ec4d250b0e98acbd01a7dadee9a1056825bba4e98cf8a917dfffa7e703

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 e8e0527a01aefdb89afd2c508f131da1
SHA1 f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256 f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512 fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 fde2ee00cbd121cfab5290b078aa3ceb
SHA1 e2b77d5320e155e413d040a8c20020962065b2f8
SHA256 2897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512 a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-18 10:16

Reported

2024-03-18 10:19

Platform

android-x86-arm-20240221-en

Max time kernel

29s

Max time network

131s

Command Line

jp.co.a_tm.android.plus_saboten_heart

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar N/A N/A
N/A /data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

jp.co.a_tm.android.plus_saboten_heart

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar --output-vdex-fd=125 --oat-fd=126 --oat-location=/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 216.58.212.194:443 googleads.g.doubleclick.net tcp
GB 216.58.212.194:443 googleads.g.doubleclick.net tcp
GB 216.58.212.194:443 googleads.g.doubleclick.net tcp
GB 216.58.212.194:443 googleads.g.doubleclick.net tcp
GB 142.250.200.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.179.234:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 e8e0527a01aefdb89afd2c508f131da1
SHA1 f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256 f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512 fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 fde2ee00cbd121cfab5290b078aa3ceb
SHA1 e2b77d5320e155e413d040a8c20020962065b2f8
SHA256 2897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512 a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56

/data/user/0/jp.co.a_tm.android.plus_saboten_heart/cache/1582435991586.jar

MD5 2048eb6124a452540ee51dae4145aadf
SHA1 d05005b2cd7fe4cd652b0d7fd1bdac2c19d51451
SHA256 105c54b6fe3f25350e92187467761598e4c21d62b1091b77d091f65f3bd98864
SHA512 bb6cb3853dd2a5d0701e20607d4e153ae201268dd2e5e2d06cc2df208b3b4dc50132a4ab428251b1644d2399fcc717662438d082ff14203387bab8794109d44d