Malware Analysis Report

2025-08-05 19:14

Sample ID 240519-eybv8sab2w
Target 58839657ee7f9bfa6fed8e13ab30f468_JaffaCakes118
SHA256 e174d554a4384793f5def0e8dde931b282a68c432cbbab860c9bca8d198da1dc
Tags
discovery evasion persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e174d554a4384793f5def0e8dde931b282a68c432cbbab860c9bca8d198da1dc

Threat Level: Shows suspicious behavior

The file 58839657ee7f9bfa6fed8e13ab30f468_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion persistence

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

Loads dropped Dex/Jar

Queries information about running processes on the device

Queries information about the current Wi-Fi connection

Checks if the internet connection is available

Requests dangerous framework permissions

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-19 04:20

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 04:20

Reported

2024-05-19 04:23

Platform

android-x86-arm-20240514-en

Max time kernel

81s

Max time network

164s

Command Line

com.ghxfdgfj.cocosandroid

Signatures

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex N/A N/A
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex N/A N/A
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/tmp.dex N/A N/A
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/tmp.dex N/A N/A
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/tmp.dex N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.ghxfdgfj.cocosandroid

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ghxfdgfj.cocosandroid/.jiagu/tmp.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/data/com.ghxfdgfj.cocosandroid/.jiagu/oat/x86/tmp.odex --compiler-filter=quicken --class-loader-context=&

sh -c ps -ef

ps -ef

Network

Country Destination Domain Proto
GB 216.58.213.3:443 tcp
GB 142.250.200.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 route.showapi.com udp
CN 118.31.18.31:80 route.showapi.com tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
CN 118.31.18.31:80 route.showapi.com tcp
US 1.1.1.1:53 ebjvu.cn udp
CN 112.65.70.244:80 ebjvu.cn tcp
CN 118.31.18.31:80 route.showapi.com tcp

Files

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/libjiagu.so

MD5 98736de515958ae37ae93a0a0e997098
SHA1 72d0f9d43f7c9bdc9f19d13834c0872f5652c0f9
SHA256 335091dfc73a9f792cb720389c5d94eb6642764a38d70d4b6b7a8afd34038421
SHA512 cc4974ce398bf7f4a20160ad30e4c4b5821ff0d7f2cc9fa0aead73ddc036585266edf429add276b53d6db8dd24a344d709469b9c839451deead6b621e70c92cf

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex

MD5 6c46931734f5dcec45045b03b81e73c1
SHA1 37f2d13387086839b07e981ce6be3df145eccca3
SHA256 7e4f543e7fcc1f2d15713d6c450a2c270b9cf1d37986eda8a550e2c0051e7593
SHA512 36bdfe3d1b2f122a4902fbd4afa37e8992482998120a4afc2c37068b9ee9cded2681843e76221c2140152fd0103de042f4d6d986c48a98418f244e56093aca66

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex

MD5 5decc63dcb1502969527af5f5c166450
SHA1 bf8168a5c06d88c48d7c1048b627e6999f399355
SHA256 2edf10c359812b48220d2ebbae0c17cd085bcb10dc8d383ae131e0f5591c27b6
SHA512 ac104799569095fcd6787ccc033a01851da765c2bd794d4f38aa5df7a0209b8fc910152b35c14795589e452b0047ebc78709116bf99b279dd56aa0489c5743bb

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/tmp.dex

MD5 f1771b68f5f9b168b79ff59ae2daabe4
SHA1 0df6a835559f5c99670214a12700e7d8c28e5a42
SHA256 9f8898ce35a47aeafced99ea0d17c33e73037bb2307c7688e50819966f4ae939
SHA512 dae27d19727b89bec49398503baa6801640540355688dfabbe689c97545295c2c2d9b0f0dcd7cbc4cfbf701d0c0c3289e647a152f49ff242d1ecc741efe4145d

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 d04cb7f74702df8f87764e97fb0db098
SHA1 6e9b9d691d63ace8be20246a10b09ddf0566ef73
SHA256 f030abf2e4d6d817efb9496711cd5661431587939a43db0e827b351279e33e01
SHA512 019c37405ed72dcffdbd0609cdf5c987685bc1c26e679a45e41c0cea88236a97bada25e832e7b1c0a207eb7e55463f802e5062000038f2ae3c06b19f7634c536

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 e9ed7944df489ac955467b70e8167c40
SHA1 d0764348b8afc4fb891c1082cdd20c76bfa82bba
SHA256 92b2a7761a7c13f6f27e7fca2d3f1ca80323fd83b4ae20d1bbacb91de0edb1bc
SHA512 11710ed707b273db50a5fe3e340b05ee28a60f344bd301767637484a5f7bfa7f5f350dd3d3dece756fc2b01aa55315ed50ca0a861e2a72c9ef05a64f437609b2

/data/data/com.ghxfdgfj.cocosandroid/files/.jiagu.lock

MD5 76816292764a7530f71c5ef5c072e5a5
SHA1 f513813289743d8cdc2302ec109867de130fbe6d
SHA256 48e6444823c2619287f7770123de6634e7ebf83e49cda9b788de851b584d76e1
SHA512 0d513628d3483cb5b5d8afb8c6ceac83f2a5ea0bb5b6611ff469acc44601a0deeb365a99f8f47d8c314a5e68a87c8f657cfe1d75c086d77fd554996fcc4de222

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.rd

MD5 4bd59a9326512c0d2aee31d15d328ac7
SHA1 d9fd2cc33ed916a44be89499a48d4d243e701b63
SHA256 b76b55dfdf32c0e142c15ad02de5b268fe5dd0957a677b3710168dd0df4e3b9a
SHA512 eefd3998f52828954c517f41836ed5e7cb6b495b7cd7884a5f85db301f032a284f46a1177e7b5285d0f4263cf8f9c2b80f6a3bacb979678ed862105877e9e26b

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.store.report_cf

MD5 4a6000ba177b8ef72e6019e86fff3d06
SHA1 60b83e65100fc60287a167426ac3423e935de64f
SHA256 c136b901de8dc12fbc1d7116b139735cf3fb572bb175650fa9bf76bffb72a167
SHA512 d8069d15d3069a16db19a36d7b5a59565b004912dd41a11f0555604e29542daa63744ebe282561b3724a9501ef42912ded2866877a80fec55526a28ee687b6dd

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.store.report_pid

MD5 09da448fde7c08d82d762bb2d658fb07
SHA1 d821c8ab5fc98e95bd83c23b7e35f83adc23ff03
SHA256 e934d8517a2bf9ffb7153b4783ca7c82960c6a5d087134ba3dccc82e6b2dbf11
SHA512 9ee669b13f2967478c0e565411a48fc5e823251cf87acdc41c61a2378ffef1f5b8c3713f64eba81367c5cf11bece937f9a259ede3e13da11fcbfe120bb6e683a

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 e75189d33815b1ed0e43f75bb40fcc5f
SHA1 988bfae564318d79ac57cffd9065c30183ce2ea5
SHA256 c71f975f61fb579eeeb12960ff7c9770f5fc8f6adaca75958b0cdfca32eb43ed
SHA512 76d3acf3cfdda1e5967ace8d16b2c4b1e02fbebbffb877f2f4523cd4f1bf50340db68111cb30fb00d1acc6ee8f5b166437c09e4dee67a74451d1918a2145b3a8

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk.h

MD5 37abd8911f306a0b9d67fd4ed4a5683a
SHA1 b48d61852fbe8ecf3ad273a36903a1aeb54b5ff3
SHA256 de6d7241104f1c276d0bbabeacdb61d40f6c775bad23d44601f100943bde3549
SHA512 4abc0e9469aaffda6cc6d3eecd35294a8c05eacaa2f0b883edf7b45963f29fe176f765d1c76557672370365457ba6516a92396320189c6387d1687512db072dc

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk

MD5 dd49f98055d7ecd643ccb6898097c570
SHA1 c7b1cb1dc2de3e979a5f3fc1e14595497cdb624b
SHA256 a4484687a6865fd5316ac64479ba80ec4cd7b7b6be26cbfb8aa99e3e5da303e8
SHA512 3d25ec34226b3e2e642e4d6cf5a5c1a0e7c8678fe70f32e34ec2d3eaa979965414d888be0634e787194fc53fdc2d8084889de88aaf906528656e95f80e8ac931

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ac

MD5 ce56d8b405504b03d4dea9eab346575b
SHA1 a675184699bd2ebdf1b7dff33def478277f44a81
SHA256 940257304f3c07e207dbd8d7199e60d368870956524f722b9130b08a0ddb9d6b
SHA512 1a9bdb6763f3a4ce883f4e6c0ecf6660432b1982bf2cf24bcf00af3e4f747724e55f62d0ea6d2eb4f0613009cd19f094459179c9d959f82964d600c8ceeb5236

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ic

MD5 580c91e882a823e95256935de274a039
SHA1 8953c83ae7b2a403738f461eb50fbb48bc64d9f7
SHA256 cd348532153ed3d471b57b1d143f8973b78885a3c666fc357a398822d639f08e
SHA512 e33975045380df85b61aca0b602991d0ca39a8549b01e0c18edfc6c2209846b56ec3fde559a7557a547616338c08cfce520a1d6183018f8d7f1b8e1db396a517

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 04:20

Reported

2024-05-19 04:23

Platform

android-x64-20240514-en

Max time kernel

92s

Max time network

166s

Command Line

com.ghxfdgfj.cocosandroid

Signatures

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex N/A N/A
N/A /data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.ghxfdgfj.cocosandroid

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 route.showapi.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
CN 118.31.18.31:80 route.showapi.com tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
CN 118.31.18.31:80 route.showapi.com tcp
GB 142.250.187.238:443 tcp
GB 142.250.200.2:443 tcp
GB 172.217.169.10:443 tcp
US 1.1.1.1:53 ebjvu.cn udp
CN 112.65.70.244:80 ebjvu.cn tcp
CN 118.31.18.31:80 route.showapi.com tcp

Files

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/libjiagu.so

MD5 98736de515958ae37ae93a0a0e997098
SHA1 72d0f9d43f7c9bdc9f19d13834c0872f5652c0f9
SHA256 335091dfc73a9f792cb720389c5d94eb6642764a38d70d4b6b7a8afd34038421
SHA512 cc4974ce398bf7f4a20160ad30e4c4b5821ff0d7f2cc9fa0aead73ddc036585266edf429add276b53d6db8dd24a344d709469b9c839451deead6b621e70c92cf

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/libjiagu_64.so

MD5 64f0958be2a8e6862b90faacb40129e0
SHA1 389c618137db70dbf84adffcdc3c5d4850a5ff24
SHA256 4f38bee50f32a8c64f4f9c671b7cece34d4a1cb926087fec8ef505327d4edfaa
SHA512 793cb7104013b7841c38e4aa14f4d9246aefa61aa9803160e6398c4115a2df5c6af304bad045c687467547deaab3bb77272a675b0d673f81f2df3dee2d1fe94d

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex

MD5 6c46931734f5dcec45045b03b81e73c1
SHA1 37f2d13387086839b07e981ce6be3df145eccca3
SHA256 7e4f543e7fcc1f2d15713d6c450a2c270b9cf1d37986eda8a550e2c0051e7593
SHA512 36bdfe3d1b2f122a4902fbd4afa37e8992482998120a4afc2c37068b9ee9cded2681843e76221c2140152fd0103de042f4d6d986c48a98418f244e56093aca66

/data/data/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex

MD5 5decc63dcb1502969527af5f5c166450
SHA1 bf8168a5c06d88c48d7c1048b627e6999f399355
SHA256 2edf10c359812b48220d2ebbae0c17cd085bcb10dc8d383ae131e0f5591c27b6
SHA512 ac104799569095fcd6787ccc033a01851da765c2bd794d4f38aa5df7a0209b8fc910152b35c14795589e452b0047ebc78709116bf99b279dd56aa0489c5743bb

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 ca0c2cd4551a85359cbe9f2d3af4a6aa
SHA1 0658ad674b020be96c2e056902099176b24cface
SHA256 73d9fb2553106f076ec03c4c2ef1496bb4541fb1654df209c96c998f54595a32
SHA512 d80852cabba849ad5fb8f2a0ddf87b98cabc392c8b51daae54649a8dc4d09a2b0a19ea4606bd11512caca0ec317fc1953c5ba3f9716741e3cae28adc7c6672d9

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 2c24e00243d50bd8198f096f08ed31c5
SHA1 3fc68e7c7e17f4b351456a1d57ac59b8d7ae4622
SHA256 1319d0a800acb887c47346c011283a0a851e7241dbb7b11f45db9b088473dee1
SHA512 21ea0dd6bf2c5d33133bf6e6e781dab7fa68381de8571556bd07147bd43c37d51fffc922a4261da7a9a99e1421bbd9946bd67c1efef698297a0d571976c03213

/data/data/com.ghxfdgfj.cocosandroid/files/.jiagu.lock

MD5 2db1f5ce5b915451eaf2fb69c0aad95d
SHA1 e0e4d8e30561e6716fb5b73af185d9c3f6d8d598
SHA256 d4c87f7a061cbc74aed83e21cdf0ae1c866652df77f29f065451b729f92ceb15
SHA512 c5fb05479d2d88705e064f00caed7700f3647f3d79703bbc2bab6cb4faf87efcc1753333d5e193c1c5b51f9e17e9d8d55a31c6834e3816ab7fca3352f4441ec2

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.rd

MD5 4bd59a9326512c0d2aee31d15d328ac7
SHA1 d9fd2cc33ed916a44be89499a48d4d243e701b63
SHA256 b76b55dfdf32c0e142c15ad02de5b268fe5dd0957a677b3710168dd0df4e3b9a
SHA512 eefd3998f52828954c517f41836ed5e7cb6b495b7cd7884a5f85db301f032a284f46a1177e7b5285d0f4263cf8f9c2b80f6a3bacb979678ed862105877e9e26b

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.store.report_pid

MD5 09da448fde7c08d82d762bb2d658fb07
SHA1 d821c8ab5fc98e95bd83c23b7e35f83adc23ff03
SHA256 e934d8517a2bf9ffb7153b4783ca7c82960c6a5d087134ba3dccc82e6b2dbf11
SHA512 9ee669b13f2967478c0e565411a48fc5e823251cf87acdc41c61a2378ffef1f5b8c3713f64eba81367c5cf11bece937f9a259ede3e13da11fcbfe120bb6e683a

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk.h

MD5 37abd8911f306a0b9d67fd4ed4a5683a
SHA1 b48d61852fbe8ecf3ad273a36903a1aeb54b5ff3
SHA256 de6d7241104f1c276d0bbabeacdb61d40f6c775bad23d44601f100943bde3549
SHA512 4abc0e9469aaffda6cc6d3eecd35294a8c05eacaa2f0b883edf7b45963f29fe176f765d1c76557672370365457ba6516a92396320189c6387d1687512db072dc

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk

MD5 dd49f98055d7ecd643ccb6898097c570
SHA1 c7b1cb1dc2de3e979a5f3fc1e14595497cdb624b
SHA256 a4484687a6865fd5316ac64479ba80ec4cd7b7b6be26cbfb8aa99e3e5da303e8
SHA512 3d25ec34226b3e2e642e4d6cf5a5c1a0e7c8678fe70f32e34ec2d3eaa979965414d888be0634e787194fc53fdc2d8084889de88aaf906528656e95f80e8ac931

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ac

MD5 ce56d8b405504b03d4dea9eab346575b
SHA1 a675184699bd2ebdf1b7dff33def478277f44a81
SHA256 940257304f3c07e207dbd8d7199e60d368870956524f722b9130b08a0ddb9d6b
SHA512 1a9bdb6763f3a4ce883f4e6c0ecf6660432b1982bf2cf24bcf00af3e4f747724e55f62d0ea6d2eb4f0613009cd19f094459179c9d959f82964d600c8ceeb5236

/data/data/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ic

MD5 580c91e882a823e95256935de274a039
SHA1 8953c83ae7b2a403738f461eb50fbb48bc64d9f7
SHA256 cd348532153ed3d471b57b1d143f8973b78885a3c666fc357a398822d639f08e
SHA512 e33975045380df85b61aca0b602991d0ca39a8549b01e0c18edfc6c2209846b56ec3fde559a7557a547616338c08cfce520a1d6183018f8d7f1b8e1db396a517

/data/data/com.ghxfdgfj.cocosandroid/.oabugaij/.fsgkea

MD5 01abfc750a0c942167651c40d088531d
SHA1 d08f88df745fa7950b104e4a707a31cfce7b5841
SHA256 334359b90efed75da5f0ada1d5e6b256f4a6bd0aee7eb39c0f90182a021ffc8b
SHA512 d369286ac86b60fa920f6464d26becacd9f4c8bd885b783407cdcaa74fafd45a8b56b364b63f6256c3ceef26278a1c7799d4243a8149b5ede5ce1d890b5c7236

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-19 04:20

Reported

2024-05-19 04:23

Platform

android-x64-arm64-20240514-en

Max time kernel

97s

Max time network

171s

Command Line

com.ghxfdgfj.cocosandroid

Signatures

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex N/A N/A
N/A /data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.ghxfdgfj.cocosandroid

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 route.showapi.com udp
CN 118.31.18.31:80 route.showapi.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
CN 118.31.18.31:80 route.showapi.com tcp
US 1.1.1.1:53 ebjvu.cn udp
CN 112.65.70.244:80 ebjvu.cn tcp
CN 118.31.18.31:80 route.showapi.com tcp

Files

/data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/libjiagu.so

MD5 98736de515958ae37ae93a0a0e997098
SHA1 72d0f9d43f7c9bdc9f19d13834c0872f5652c0f9
SHA256 335091dfc73a9f792cb720389c5d94eb6642764a38d70d4b6b7a8afd34038421
SHA512 cc4974ce398bf7f4a20160ad30e4c4b5821ff0d7f2cc9fa0aead73ddc036585266edf429add276b53d6db8dd24a344d709469b9c839451deead6b621e70c92cf

/data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/libjiagu_64.so

MD5 64f0958be2a8e6862b90faacb40129e0
SHA1 389c618137db70dbf84adffcdc3c5d4850a5ff24
SHA256 4f38bee50f32a8c64f4f9c671b7cece34d4a1cb926087fec8ef505327d4edfaa
SHA512 793cb7104013b7841c38e4aa14f4d9246aefa61aa9803160e6398c4115a2df5c6af304bad045c687467547deaab3bb77272a675b0d673f81f2df3dee2d1fe94d

/data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex

MD5 6c46931734f5dcec45045b03b81e73c1
SHA1 37f2d13387086839b07e981ce6be3df145eccca3
SHA256 7e4f543e7fcc1f2d15713d6c450a2c270b9cf1d37986eda8a550e2c0051e7593
SHA512 36bdfe3d1b2f122a4902fbd4afa37e8992482998120a4afc2c37068b9ee9cded2681843e76221c2140152fd0103de042f4d6d986c48a98418f244e56093aca66

/data/user/0/com.ghxfdgfj.cocosandroid/.jiagu/classes.dex!classes2.dex

MD5 5decc63dcb1502969527af5f5c166450
SHA1 bf8168a5c06d88c48d7c1048b627e6999f399355
SHA256 2edf10c359812b48220d2ebbae0c17cd085bcb10dc8d383ae131e0f5591c27b6
SHA512 ac104799569095fcd6787ccc033a01851da765c2bd794d4f38aa5df7a0209b8fc910152b35c14795589e452b0047ebc78709116bf99b279dd56aa0489c5743bb

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 53e4dcb6c7a397cbce2be463e02e6aed
SHA1 3e39ff8674b9ab6fe407ad1a9b8d7dc169db021b
SHA256 b2c333cc33c889e242c67fede7c26ebeeadc84e1e78267cccb52cee9e375daad
SHA512 205e355859d2abbac4f2c080c4f9e495d2796d23196ca2eee34174fdc368c38d28a1b4f2fb9ca1902818e35a0b7cc2aedc664d749da57e08553ec713950b7fe7

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ri

MD5 a90f89554a17a2743445340a73d260c2
SHA1 a5138276bbb0ab4f5350e14bcc2b90bbfd420eaf
SHA256 e4a9bc912b04f9a3dbde94f829d898bc1e33b878e42712068bd3cc7c75a73b6a
SHA512 e72e91f209ebc3807015e8dc7ea71a13115e69e00b259230b364be9c43376995f8453d437266fcfa0ddab1429695346ab0c0464f2a5052b72d353c64d771e641

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jiagu.lock

MD5 a780aa8b13f27a697fd4c08567d2dda0
SHA1 28419ef1f25e0d378bf5de67f7db433ba3fbe9b1
SHA256 03ab4efdcb1fde3af4fff8cfd82a6a36b5f6504b7566264987c072571dd84c88
SHA512 8c69e7be7eb2c842b83eb1ba7a69cb47e1d973e54de8f30b0a10d381f49337d3d0a9c5dede41584e64c0e93a14c0c5a09414b516f7b50112f4a72407eb587efb

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.rd

MD5 4bd59a9326512c0d2aee31d15d328ac7
SHA1 d9fd2cc33ed916a44be89499a48d4d243e701b63
SHA256 b76b55dfdf32c0e142c15ad02de5b268fe5dd0957a677b3710168dd0df4e3b9a
SHA512 eefd3998f52828954c517f41836ed5e7cb6b495b7cd7884a5f85db301f032a284f46a1177e7b5285d0f4263cf8f9c2b80f6a3bacb979678ed862105877e9e26b

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.store.report_pid

MD5 09da448fde7c08d82d762bb2d658fb07
SHA1 d821c8ab5fc98e95bd83c23b7e35f83adc23ff03
SHA256 e934d8517a2bf9ffb7153b4783ca7c82960c6a5d087134ba3dccc82e6b2dbf11
SHA512 9ee669b13f2967478c0e565411a48fc5e823251cf87acdc41c61a2378ffef1f5b8c3713f64eba81367c5cf11bece937f9a259ede3e13da11fcbfe120bb6e683a

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk.h

MD5 37abd8911f306a0b9d67fd4ed4a5683a
SHA1 b48d61852fbe8ecf3ad273a36903a1aeb54b5ff3
SHA256 de6d7241104f1c276d0bbabeacdb61d40f6c775bad23d44601f100943bde3549
SHA512 4abc0e9469aaffda6cc6d3eecd35294a8c05eacaa2f0b883edf7b45963f29fe176f765d1c76557672370365457ba6516a92396320189c6387d1687512db072dc

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.pk

MD5 dd49f98055d7ecd643ccb6898097c570
SHA1 c7b1cb1dc2de3e979a5f3fc1e14595497cdb624b
SHA256 a4484687a6865fd5316ac64479ba80ec4cd7b7b6be26cbfb8aa99e3e5da303e8
SHA512 3d25ec34226b3e2e642e4d6cf5a5c1a0e7c8678fe70f32e34ec2d3eaa979965414d888be0634e787194fc53fdc2d8084889de88aaf906528656e95f80e8ac931

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ac

MD5 ce56d8b405504b03d4dea9eab346575b
SHA1 a675184699bd2ebdf1b7dff33def478277f44a81
SHA256 940257304f3c07e207dbd8d7199e60d368870956524f722b9130b08a0ddb9d6b
SHA512 1a9bdb6763f3a4ce883f4e6c0ecf6660432b1982bf2cf24bcf00af3e4f747724e55f62d0ea6d2eb4f0613009cd19f094459179c9d959f82964d600c8ceeb5236

/data/user/0/com.ghxfdgfj.cocosandroid/files/.jglogs/.jg.ic

MD5 580c91e882a823e95256935de274a039
SHA1 8953c83ae7b2a403738f461eb50fbb48bc64d9f7
SHA256 cd348532153ed3d471b57b1d143f8973b78885a3c666fc357a398822d639f08e
SHA512 e33975045380df85b61aca0b602991d0ca39a8549b01e0c18edfc6c2209846b56ec3fde559a7557a547616338c08cfce520a1d6183018f8d7f1b8e1db396a517

/data/data/com.ghxfdgfj.cocosandroid/.oabugaij/.fsgkea

MD5 01abfc750a0c942167651c40d088531d
SHA1 d08f88df745fa7950b104e4a707a31cfce7b5841
SHA256 334359b90efed75da5f0ada1d5e6b256f4a6bd0aee7eb39c0f90182a021ffc8b
SHA512 d369286ac86b60fa920f6464d26becacd9f4c8bd885b783407cdcaa74fafd45a8b56b364b63f6256c3ceef26278a1c7799d4243a8149b5ede5ce1d890b5c7236