Analysis Overview
SHA256
e72806a1842aa2bf7fefdf85ef98424bca3abc462761111b902d408e347ddf1e
Threat Level: Likely malicious
The file 68219950da4733e2b4275b81538f193d_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Checks if the Android device is rooted.
Queries information about the current Wi-Fi connection
Makes use of the framework's foreground persistence service
Queries the mobile country code (MCC)
Obtains sensitive information copied to the device clipboard
Checks memory information
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks CPU information
Reads information about phone network operator.
Requests dangerous framework permissions
Checks if the internet connection is available
Queries the unique device ID (IMEI, MEID, IMSI)
Declares services with permission to bind to the system
Listens for changes in the sensor environment (might be used to detect emulation)
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-22 18:03
Signatures
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by input method services to bind with the system. Allows apps to provide custom input methods (keyboards). | android.permission.BIND_INPUT_METHOD | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. | android.permission.PROCESS_OUTGOING_CALLS | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-22 18:03
Reported
2024-05-22 18:06
Platform
android-x86-arm-20240514-en
Max time kernel
179s
Max time network
131s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /sbin/su | N/A | N/A |
| N/A | /system/bin/su | N/A | N/A |
| N/A | /system/xbin/su | N/A | N/A |
| N/A | /sbin/su | N/A | N/A |
| N/A | /system/xbin/su | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Reads information about phone network operator.
Listens for changes in the sensor environment (might be used to detect emulation)
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
com.ttfw.aimei
su
/system/bin/sh
ls -l /sbin/su
ls -l /system/xbin/su
su
Network
| Country | Destination | Domain | Proto |
| GB | 216.58.213.3:443 | tcp | |
| GB | 142.250.200.14:443 | tcp | |
| GB | 142.250.200.10:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | m.redirect.anjian.com | udp |
| US | 1.1.1.1:53 | mobileanjian.aliapp.com | udp |
| US | 1.1.1.1:53 | oc.umeng.com | udp |
| CN | 59.82.23.79:80 | oc.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | oc.umeng.co | udp |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| GB | 172.217.169.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/data/data/com.ttfw.aimei/files/script.lc
| MD5 | e15343de40f554c15a523687a77de5b4 |
| SHA1 | 5eb3452d301017d81374e3165018954501668ad2 |
| SHA256 | d9634980694651eecd793a61abe5d7806f7a9f556b3339e7574fafa00ed3373e |
| SHA512 | de81c719eb1fe8e81284069348653393ec45b3df69ca31abdf0f8c77042d90289e408981523af9eb7333f34dd40b671917a5d57289f863ed783c5da219dfed89 |
/data/data/com.ttfw.aimei/files/script.atc
| MD5 | 801efdfc104b170f023e0303293f2c11 |
| SHA1 | 8d42f0c50156bbe4dbee0c1482be6e5d7102735d |
| SHA256 | 5a1d43df4d722a9f316eb84cc55286b8d8b6a3c35edc8a2575789c2fea549460 |
| SHA512 | 386764c1e2bda1f686988db4791f1dfe6fa305a5776f1de0e05e53439fa79f02d4ef8b92c4728fac4bae5ea37187251fd89b22383cbda59c96759753fdc35e2b |
/data/data/com.ttfw.aimei/files/script.ui
| MD5 | 8f0d25231411585b4f45dddae8f8ed68 |
| SHA1 | a932dca0f03f782863243e3a9da5ac1c42ccc859 |
| SHA256 | 0c5abb3653bffccede96f8a14dfa3c6966d0db2bbe96708abc0c580a5c943ed2 |
| SHA512 | 70336cd3176fa30d02e9f9b020b1aff9d581f2ef8ff0ad9fff05b19f18002b40e5ac29201310e70b5b2fd98b7d2f7c1a0f9c090b8d77803729ae0e420e659d9b |
/storage/emulated/0/Android/data/com.ttfw.aimei/cache/uil-images/journal.tmp
| MD5 | 8c92de9ce46d41a22f3b20f77404cc1d |
| SHA1 | 8671a6dca00edb72be47363a7071be65cf270373 |
| SHA256 | 68bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274 |
| SHA512 | 30f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56 |
/data/data/com.ttfw.aimei/files/eventservice.jar
| MD5 | 0596a9ef16c617e44e699bdf5cd85905 |
| SHA1 | c32911f89a6207b80898408463e46c3e7d6e6c02 |
| SHA256 | 35626d776baa83a6d4624aeaccd13d6ed16ce48e48d3ef6c877f93d07584708e |
| SHA512 | a5b7703ac0bc9f44cbb76261298da2b6644cd5c22a3272574d662fc6adc061f7c142dc8c8d3bfdce9b2825b17c8e6054f8788be940b965e7890015179ddb15ae |
/data/data/com.ttfw.aimei/files/UIConfig.config
| MD5 | 5b4cad22ef0e9adade2695c6d5a55f8f |
| SHA1 | fd58195afbed302751b3798047d53407366fe33a |
| SHA256 | 53bece7fa2ca989e110900fd76e64414e53fcf99066471aa3bb86109092d2440 |
| SHA512 | 6976d3adfa578df50f339aec7444bd916f36d16b8699feade70ab40514b504a7e5a7ef3e776bd2ce7a49fd346fee61ed97ad84c0b376ebb0681a1b020121e253 |
/data/data/com.ttfw.aimei/files/mobclick_agent_cached_com.ttfw.aimei
| MD5 | ae0ca7b5176de10d72d8ec3d5cb61821 |
| SHA1 | 2fd6c37e052e63d6c3ba7201d7f8236534da7447 |
| SHA256 | 306d9db83c73a3c68bb1ad6cc6f14f946af3b5b15330d552c3eca0305882219f |
| SHA512 | d734dc5bec48534b0daaf07e6a789b7901e4e9138f3dd2e247ef3eff49d19dad1bf6b493c898eb8e3bd672b3c83af9db2edd7335620ab91c28124e0a7883b3bc |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-22 18:03
Reported
2024-05-22 18:06
Platform
android-x64-20240514-en
Max time kernel
64s
Max time network
152s
Command Line
Signatures
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries the unique device ID (IMEI, MEID, IMSI)
Listens for changes in the sensor environment (might be used to detect emulation)
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
com.ttfw.aimei
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | m.redirect.anjian.com | udp |
| US | 1.1.1.1:53 | mobileanjian.aliapp.com | udp |
| US | 1.1.1.1:53 | oc.umeng.com | udp |
| CN | 59.82.23.79:80 | oc.umeng.com | tcp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| CN | 121.199.250.10:80 | mobileanjian.aliapp.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.169.8:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | oc.umeng.co | udp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| GB | 216.58.212.226:443 | tcp | |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| GB | 142.250.200.36:443 | tcp | |
| GB | 142.250.200.36:443 | tcp | |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/data/data/com.ttfw.aimei/files/script.lc
| MD5 | e15343de40f554c15a523687a77de5b4 |
| SHA1 | 5eb3452d301017d81374e3165018954501668ad2 |
| SHA256 | d9634980694651eecd793a61abe5d7806f7a9f556b3339e7574fafa00ed3373e |
| SHA512 | de81c719eb1fe8e81284069348653393ec45b3df69ca31abdf0f8c77042d90289e408981523af9eb7333f34dd40b671917a5d57289f863ed783c5da219dfed89 |
/data/data/com.ttfw.aimei/files/script.atc
| MD5 | 801efdfc104b170f023e0303293f2c11 |
| SHA1 | 8d42f0c50156bbe4dbee0c1482be6e5d7102735d |
| SHA256 | 5a1d43df4d722a9f316eb84cc55286b8d8b6a3c35edc8a2575789c2fea549460 |
| SHA512 | 386764c1e2bda1f686988db4791f1dfe6fa305a5776f1de0e05e53439fa79f02d4ef8b92c4728fac4bae5ea37187251fd89b22383cbda59c96759753fdc35e2b |
/data/data/com.ttfw.aimei/files/script.ui
| MD5 | 8f0d25231411585b4f45dddae8f8ed68 |
| SHA1 | a932dca0f03f782863243e3a9da5ac1c42ccc859 |
| SHA256 | 0c5abb3653bffccede96f8a14dfa3c6966d0db2bbe96708abc0c580a5c943ed2 |
| SHA512 | 70336cd3176fa30d02e9f9b020b1aff9d581f2ef8ff0ad9fff05b19f18002b40e5ac29201310e70b5b2fd98b7d2f7c1a0f9c090b8d77803729ae0e420e659d9b |
/storage/emulated/0/Android/data/com.ttfw.aimei/cache/uil-images/journal.tmp
| MD5 | 8c92de9ce46d41a22f3b20f77404cc1d |
| SHA1 | 8671a6dca00edb72be47363a7071be65cf270373 |
| SHA256 | 68bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274 |
| SHA512 | 30f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56 |
/data/data/com.ttfw.aimei/files/eventservice.jar
| MD5 | 0596a9ef16c617e44e699bdf5cd85905 |
| SHA1 | c32911f89a6207b80898408463e46c3e7d6e6c02 |
| SHA256 | 35626d776baa83a6d4624aeaccd13d6ed16ce48e48d3ef6c877f93d07584708e |
| SHA512 | a5b7703ac0bc9f44cbb76261298da2b6644cd5c22a3272574d662fc6adc061f7c142dc8c8d3bfdce9b2825b17c8e6054f8788be940b965e7890015179ddb15ae |
/data/data/com.ttfw.aimei/files/mobclick_agent_cached_com.ttfw.aimei
| MD5 | 03665a06c82f4d8266d621c10dfab8bb |
| SHA1 | fc37d1cad486160f5a55d3ea47192b05c0933bf5 |
| SHA256 | 224415ec06ad239301300006f4ee571e36892b05e846fb8579f36b16baac3acf |
| SHA512 | 99bf9a6084e47dfae98721bfb83c2eaa4318a7695e71ca8114f19f288b3e3ace9b9a6aacfca996b4be3d7027a26a6e3c7f4795679a41f993d377658b8f8e5ca9 |