Malware Analysis Report

2024-10-19 12:07

Sample ID 240521-typ57abg8w
Target 63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118
SHA256 d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9
Tags
discovery evasion stealth trojan persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9

Threat Level: Likely malicious

The file 63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

discovery evasion stealth trojan persistence

Removes its main activity from the application launcher

Queries information about running processes on the device

Registers a broadcast receiver at runtime (usually for listening for system events)

Loads dropped Dex/Jar

Checks if the internet connection is available

Reads information about phone network operator.

Requests dangerous framework permissions

Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-21 16:28

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-21 16:28

Reported

2024-05-21 16:31

Platform

android-x64-arm64-20240514-en

Max time kernel

178s

Max time network

131s

Command Line

tms.px.train

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/tms.px.train/files/v.jar N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

tms.px.train

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.179.234:443 tcp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 kapj.kachapt.cn udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp

Files

/data/user/0/tms.px.train/files/v.jar

MD5 f09458c16f639a360dc284640f9598c5
SHA1 fa2aa1fe360000e0756da51c790755c599def485
SHA256 e358877146fa29274dfc9612d3bed40d324c60c955bfd3fa3f49801e8c498435
SHA512 768c922729eb72ba37d4070575025d88dc46b94c38d854ad2a586cd1acfb7742d386ec74a18464f2391bb3159c085bf428cd54383dc882505760f9bd27b8855c

/data/user/0/tms.px.train/files/v.jar

MD5 8b326ffbebf17b6dbf3f6d6224f148c7
SHA1 aaa5dec5c14ac72c39ab2e3116b7fb9c8e99061a
SHA256 7591ce43ea43cd03bb4d5fad2e8d437ee067e7d1b276471e8a8c0d05af954a88
SHA512 01e7931fdd71bfb1f7645c0db394b638bf4438620f4650d10ff1667463646ac7071a353345c5a0799027415f4ab95e066893519539de918aab1789f9a17675e6

/data/user/0/tms.px.train/databases/t_u.db-journal

MD5 3cf8188e4fa40e4742af208155c8a162
SHA1 6cb1b1905ba7c446e4d4dcdd16fd870a58e9ea0c
SHA256 fd802a3d9843ae4f66c84c1ba8aadb76a17f3347fec31bdd6bada9352e86a93c
SHA512 ee98b19057578a0fa91f006bc1d173b6f103bb011533ac66f7d2c2b8356c804ebd2448fac1604dff99aa07200be408769c0b53e46eff4bad6a9e10c38450dedf

/data/user/0/tms.px.train/databases/t_u.db

MD5 ca59a29efb4659466f012f31eb911ccf
SHA1 f9e776ace2529a0edf4760c8bc1689052db47b6e
SHA256 bc244d26285b5d909d8aa1872fd46ddd212b8ad6d90f93f21b979ec7f1cd808a
SHA512 e58a831b288f74a965a21c8bf8d281d93ad78182e95efdef58ec0c6b806cde3bbfcf4cfd0aef97bdc749d01d5490cf7ad31fc164718bc2ec324d6a46dc7ae9ef

/data/user/0/tms.px.train/databases/t_u.db-journal

MD5 f4b1fdd82c875aa0de3531516821543d
SHA1 5c17a8ca6fafebc23bd5d546d24b044c55d45b4f
SHA256 d68843bac79b49f38e2c2daca51b600c590e40ba0d64388ee372903a91e8e084
SHA512 5034219ea626f4da687b081ed615bf9087fc43bafe8f7d6ed56be37436a313f462ffe5b03b6d97727ebe8728a80fdfefc2bd973b0c7587313bd33e5d70c5b7d0

/data/user/0/tms.px.train/databases/t_u.db-journal

MD5 2d7b0853bd20cb89cb34dd9225f5dc1d
SHA1 6aee42944b59e1aa1b0e016869eb11c639681e8f
SHA256 3f098ae8dd27e61301d3205a8204535f0dda45038e5542667957fea9f52aa3cf
SHA512 096ff4e3e44c81296b23016df9dc41884f4166fb72e239f7e73d0cb263528ec4489be6b3889a912d2b5a2544180453f2a63c73bfc7cc4888786284f1d8a5506a

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 16:28

Reported

2024-05-21 16:31

Platform

android-x86-arm-20240514-en

Max time kernel

178s

Max time network

142s

Command Line

tms.px.train

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/tms.px.train/files/v.jar N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

tms.px.train

Network

Country Destination Domain Proto
GB 142.250.187.195:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 kapj.kachapt.cn udp
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

/data/data/tms.px.train/files/v.jar

MD5 f09458c16f639a360dc284640f9598c5
SHA1 fa2aa1fe360000e0756da51c790755c599def485
SHA256 e358877146fa29274dfc9612d3bed40d324c60c955bfd3fa3f49801e8c498435
SHA512 768c922729eb72ba37d4070575025d88dc46b94c38d854ad2a586cd1acfb7742d386ec74a18464f2391bb3159c085bf428cd54383dc882505760f9bd27b8855c

/data/user/0/tms.px.train/files/v.jar

MD5 8b326ffbebf17b6dbf3f6d6224f148c7
SHA1 aaa5dec5c14ac72c39ab2e3116b7fb9c8e99061a
SHA256 7591ce43ea43cd03bb4d5fad2e8d437ee067e7d1b276471e8a8c0d05af954a88
SHA512 01e7931fdd71bfb1f7645c0db394b638bf4438620f4650d10ff1667463646ac7071a353345c5a0799027415f4ab95e066893519539de918aab1789f9a17675e6

/data/data/tms.px.train/databases/t_u.db-journal

MD5 267175c91feffda9c76a865a5d0fb6f0
SHA1 2133b373d6461d84d3852db99d952e420e0b1845
SHA256 c54abe082ec43a9ab4595fde5f2b4d161e2a9f569d2440b1c58586cb1526bbee
SHA512 d68691581bdd6f296e1081f7f768ab8a3854dd37b7e091ae3c1b44b9c1097e4c49f7de37b7dc8f428766bb6a3532683e74a595e2534cc2b95dd1e54e9e1ea946

/data/data/tms.px.train/databases/t_u.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/tms.px.train/databases/t_u.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/tms.px.train/databases/t_u.db-wal

MD5 2a104e597cd27c259fc0140504560f28
SHA1 be943d67296a93b924f0dcd595eb522271f9f8e8
SHA256 d84991c4274d63711e294169c8284a48423f4ca842f8c7f741cdc6bcd2085ccc
SHA512 bc2cca1399ae5b333cd0866eb7e1fe834ccb3073bf21abf0470768802424e00967e0c428c24bf0b875c5fd068945a8941105e0cc4f21a86ae691963e9b1e0206

/data/data/tms.px.train/files/oat/v.jar.cur.prof

MD5 84dca53100fe528405af621afe9ac417
SHA1 97c5b727eb3d67fd2de96e663d610ce7e25021e5
SHA256 a53ea7c359796c26b5bed504cc684c33b27f1025fefe39219718fb75099f9233
SHA512 3aff076007db7c5174162de9e152f7a5bf6d4a29caa30d49120830732cc1188c1054b2c7dfe552568f7b3dc5c178cda0964ac959e26ed3b5c43d37300c1a9a4b

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 16:28

Reported

2024-05-21 16:31

Platform

android-x64-20240514-en

Max time kernel

179s

Max time network

131s

Command Line

tms.px.train

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/tms.px.train/files/v.jar N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Processes

tms.px.train

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 kapj.kachapt.cn udp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.169.40:443 ssl.google-analytics.com tcp
GB 142.250.187.238:443 tcp
GB 142.250.200.2:443 tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp

Files

/data/data/tms.px.train/files/v.jar

MD5 f09458c16f639a360dc284640f9598c5
SHA1 fa2aa1fe360000e0756da51c790755c599def485
SHA256 e358877146fa29274dfc9612d3bed40d324c60c955bfd3fa3f49801e8c498435
SHA512 768c922729eb72ba37d4070575025d88dc46b94c38d854ad2a586cd1acfb7742d386ec74a18464f2391bb3159c085bf428cd54383dc882505760f9bd27b8855c

/data/user/0/tms.px.train/files/v.jar

MD5 8b326ffbebf17b6dbf3f6d6224f148c7
SHA1 aaa5dec5c14ac72c39ab2e3116b7fb9c8e99061a
SHA256 7591ce43ea43cd03bb4d5fad2e8d437ee067e7d1b276471e8a8c0d05af954a88
SHA512 01e7931fdd71bfb1f7645c0db394b638bf4438620f4650d10ff1667463646ac7071a353345c5a0799027415f4ab95e066893519539de918aab1789f9a17675e6

/data/data/tms.px.train/databases/t_u.db-journal

MD5 9d1aa459d9df18768a088a48bb25bedd
SHA1 6edaed69f5990961d1c8a9c4f2b65c48123f42b7
SHA256 c475f788ee8c495c5386d432402a3f16e9e2ac1ea85078eb8957b4091c2117cd
SHA512 8349f7b12d9f5036297f6bde1c742d7c921b7e4e54cef7b538db978f92fd21651139db61e27a72ed98cedd0abd2e89e9ef72fc886f6f3a7595733e5d173d252f

/data/data/tms.px.train/databases/t_u.db

MD5 fe67167fe07284cf64b9ad8dd86d7044
SHA1 036a4ed6202cfcb3d9f874fc70ed1a3c8a0856e2
SHA256 fa13d6ebb4434629291b7477f89ee3d8507beaaa038a04ce0f56af8d5558a848
SHA512 1656f8a3419c9fee47dc558db1a105da58968e804087e471008c1b742350727dcad0524dc5e2e1a521e40603fe73018c8d2d1722929d88b0213eefef4d774687

/data/data/tms.px.train/databases/t_u.db-journal

MD5 c4547d0fb3e9aa77c39184c7bf4ad438
SHA1 18da8857855434d0e745347453b7a027161c6964
SHA256 0055da87ae28b232ce5aeb8a744758dc2838a8a739fa18361549338e3381981f
SHA512 61bc86ce19e14633977901e83cb5cf51228e85fe9e651d8c46dabd3e5abacb73d860b8892d99c4aa32a5ff26d05d1e9512f4f402c51d93f8b61e88cbd51b47cd

/data/data/tms.px.train/databases/t_u.db-journal

MD5 ce62181b4c34b162f364c00557bf6bdc
SHA1 09633c0865326fbb33dd5ecd92f9069f84e9f3f9
SHA256 0ee8530d8c078046dd447bdcf98aea1212fb8af3e1e86d7bdd68deeba0af15f1
SHA512 2aa9d147736f3dc0722c0e37e9801b55144b18c469cc16bdc4e9e85b8b11ddb79547bb4a7a8aa7dbe3be9172f46baa758df5b4dda8f4e654e472b78d03c86081