Malware Analysis Report

2024-07-28 14:46

Sample ID 240527-xbfj1sdf31
Target 7a1fd6a1963e284dfe2a5ac72c20f3da_JaffaCakes118
SHA256 7164b77bb97e96b5900dc8468c70dedd5e3ce4957f9e2356cb4e58461f005808
Tags
discovery evasion impact persistence privilege_escalation stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

7164b77bb97e96b5900dc8468c70dedd5e3ce4957f9e2356cb4e58461f005808

Threat Level: Likely malicious

The file 7a1fd6a1963e284dfe2a5ac72c20f3da_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

discovery evasion impact persistence privilege_escalation stealth trojan

Removes its main activity from the application launcher

Registers a broadcast receiver at runtime (usually for listening for system events)

Queries the phone number (MSISDN for GSM devices)

Tries to add a device administrator.

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Acquires the wake lock

Reads information about phone network operator.

Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-27 18:40

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-27 18:40

Reported

2024-05-27 18:43

Platform

android-x86-arm-20240514-en

Max time kernel

13s

Max time network

131s

Command Line

com.android.services

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.android.services

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 newbot.hackdim0.myjino.ru udp
GB 142.250.200.3:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/com.android.services/databases/bot_starsds-journal

MD5 1ef0421af97d272440b88e782129f902
SHA1 4b93268ef8f9840ca89206d8daa549dcdd70e99b
SHA256 44bd2fd60e5cebaa4b86ecd7cb4d715102f3193b9ae15897f6fc0dc362d465d0
SHA512 201b49d69d5ab6e103b0ebeaba6b2cd2246f427b9af8800f178eb357afe709dcf0a7659becd0fdcf856587f370eae1506ec9b6141129df2ad5c39e5810e09bf3

/data/data/com.android.services/databases/bot_starsds

MD5 71892b9da2596d8462629a9641128514
SHA1 09d21de59e1b64b6650cf19cde6fd1c751caa6b2
SHA256 00c8f482258fb519c11042083b75044a097c3550af43d125641ba1abc6920aff
SHA512 7f70091d8885ec69ff434a26b8eea3b29a66507d445e7848b070c322ed6547349e953915b8113dbf856b6ff2921517a0ef0852d2d866ff909047c1b3c11f8ae1

/data/data/com.android.services/databases/bot_starsds-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.android.services/databases/bot_starsds-wal

MD5 7f2e529d8a3c82c9087102387374ccf0
SHA1 0532372416cf3d3260498ea2956b2038e9870f21
SHA256 4b63bd451bcf85e6b8907e31d9ecc0fbf0f4cdfba419adc5aa2a5a2443d2bda0
SHA512 3df411ba61e4e1bae887e05884a5105317d3cd9bc263644222726a0488f5f5e2c4dd32ecec1e052fa4b87c9992e159ed7cb24014a53ba54dc7018a60caf37973

/data/data/com.android.services/databases/bot_starsds-wal

MD5 f4ff0ec287edb2e6c8f89708cac57b35
SHA1 0ab47f25407ffbf5320a71abc412d935c1b2e73f
SHA256 028c9af5a80dac46e8cc7b51322e38950d8c7928e722aee3772715a4ee056dac
SHA512 46e15b27386262d91b061c17f2b68b51cf17be1bcdbf7d4aba3cd51dc91f878701d7116b228e48e1db6f049df5eba556aabe2587925b5e8e57a8c3621f578f5d

/data/data/com.android.services/databases/bot_starsds

MD5 23da1c4d966fe65f7f9b82db14032299
SHA1 5ef00cdf2481889c7869a22894b1dbd1963cc6fd
SHA256 3b26f4391998ce93c55673ff29ba0efc567978729ee94309559a1c0338b47187
SHA512 2b9dacdecc7554c6d3aa1b3d7411c632f0dd066c77f2b3c39974c5335b7b4f94cf6b08306e8078cf29fc012b065b4fdead8382df293b675ff865eb2cb417896f

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-27 18:40

Reported

2024-05-27 18:43

Platform

android-x64-20240514-en

Max time kernel

13s

Max time network

129s

Command Line

com.android.services

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Processes

com.android.services

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 newbot.hackdim0.myjino.ru udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 172.217.16.238:443 tcp
GB 142.250.179.226:443 tcp
GB 142.250.178.4:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.4:443 www.google.com tcp

Files

/data/data/com.android.services/databases/bot_starsds-journal

MD5 f6cccc90705597129bff95d6b44fb808
SHA1 403142306bcf18d4f52c59cbea19dbbd50f09d42
SHA256 56a8169c3e1f32a40dfff68786f1cef84da885db454ead5ad6100bdb636207a3
SHA512 1a0aeb2d7e673544fedf656abff9ef27db2dd2bdafe42aa9b159aa57a60be608d74325aae5362a22b21ce2c253d5f3cce88d7b5e415b02c9a348c2912a4b5877

/data/data/com.android.services/databases/bot_starsds

MD5 7a3ffba00ee513b42199aa2492940457
SHA1 39629518c2a73154be32d67146f83aa85985e522
SHA256 930db1f3ee1e84e526474623f2d095454ee9d1ae505925af4c23bf65181795b0
SHA512 afc87ac64b07c3af91eff1aee784e692cbe7df1d8b3c8c85b225b543765e5b69e6f46539570fa95571b8cbcf25e55bc77b08a4e974ed350c328e0a1a63c74ec3

/data/data/com.android.services/databases/bot_starsds-journal

MD5 415593a41d446c481dc91fda04c73868
SHA1 4514979bc9930c1b79a7f4b8affbd31e8de1c333
SHA256 61d28d0d9d6a408b3c69f9c0e91d41dd264d9e7fe40f80f2c2d37017ef368cf0
SHA512 f825522bc0eb960ba95c3c92ef682bfd502d9cef3762df1d6abf4a2ad2c9073e3e973a4f5eedd5d82d9f2ec9cc81e7dda729b408c6f5f076694599e37494e569

/data/data/com.android.services/databases/bot_starsds-journal

MD5 913b5943b67dfe743abf014415db295e
SHA1 33ff8bd78979c9a0e0eff09d0c52729097259703
SHA256 ee24f231d69451fd2cea04aa6576a0d5b605fdb7f5c44a15f9aa1a75bb669099
SHA512 1d4fbf000b1a15593c5c25b8aa80281bec1dd7797f980def1b491df0e235833e6b6c8b24d90899303d83c7c517745eca719f54257eebdffd6dfb854993ea8276

/data/data/com.android.services/databases/bot_starsds-journal

MD5 4169c3541830b35cfd7eb0a700e672e4
SHA1 d879eefb1f323fb786fde59ecda9f0ea706c371d
SHA256 d7a4c7ad0b9459524b69da7adef8d27ea5a57ba9f95d0e78153732e9b5c8b9b8
SHA512 2ad876d75659e72a9cce7917852c8faf46dc6f2ba64f5991365aac8fe892573cf6a4accfbfb0639d79e42bf89ea642db967591125a3461f36393921581b18129

/data/data/com.android.services/databases/bot_starsds

MD5 9ccbc8934c167495ce716a78dcdfff24
SHA1 d567bdbde22e0159422294e8fc2b6544717a5ef3
SHA256 a0109a74db9de9b85ec5253160f6deaa79e9704b1fa3a69b05add68f44056e28
SHA512 7223a2d660d30ef16f4b8c8c45b97631c662c22a084f0118c556c4a3ae75cee7ed96c6b37fe5033097d55db4133790a6f29f1ab3087d4214ec88930bfb16f7cd

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-27 18:40

Reported

2024-05-27 18:43

Platform

android-x64-arm64-20240514-en

Max time kernel

13s

Max time network

132s

Command Line

com.android.services

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.android.services

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
US 1.1.1.1:53 newbot.hackdim0.myjino.ru udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp

Files

/data/user/0/com.android.services/databases/bot_starsds-journal

MD5 211f98569b131b102a1a7f246d6e21cc
SHA1 5078b642cc54245d49e6ac105923a64de69bd6df
SHA256 2e13c1fd887d2a452007cfbacfccbc210557508b6c3ff3ff573144c11c5b220a
SHA512 2fea964beaabb58cf5b140ddf4df803588c4900aa58f9dcd672b3f3018dcfb073bd6e3855f408dbfbd189a2a456229866d24926cd87b18e3788487a5ae7b8034

/data/user/0/com.android.services/databases/bot_starsds

MD5 cfb9b8a418d864ee2f800a3e9cd85782
SHA1 606c812b70e63913254a090980ce30afbf1b3547
SHA256 66dd11697c42c503811555d22d2a2d648dadff0cba82fa4fa650140c51772253
SHA512 f8efc609df5789390d1842c58cb4041bf75968449007ab36f26ae8f6f32abab7cd80e4d9707253e1f403cb39486c1a1ffddadbf71405c66a69d4a28ad7ce8ade

/data/user/0/com.android.services/databases/bot_starsds-journal

MD5 ce0be8a9c9aba20dcbfa7af3daaf8b82
SHA1 7604ae6f9de34100b983dfd6003bbaa5bc9ebd80
SHA256 1b11f81609f3fb5ef4516da7bf4cd731936e16638e6b46b8135a5f4418ae30b1
SHA512 591479fc844867d3b722b5adab4ccc46bec32f35dd326511951e1b89e27cc059736e4731701a0373136406e3979e8376793929afb335ccfbae4ca923f1fbfb7a

/data/user/0/com.android.services/databases/bot_starsds-journal

MD5 e1848ea45dc17b9c4d43d975d6dea2eb
SHA1 80b78546089ab9514c5bfc333dd32a4df7e5b10a
SHA256 17a7fee28c235fc170e198d2578b468ec2b73e3ffa85e502b656b46cfe2be326
SHA512 27240350f3c70919d6fc98cfe4f3f7bd23d4415a295b12985649c3eaa90d45dcea5b78b63eeb1199e7be3d81fa25fa5f52d4e61e2e99409ea3fc824598005df2

/data/user/0/com.android.services/databases/bot_starsds-journal

MD5 ab48ce037bc90f1d6ace45baec0f9c70
SHA1 b413a611561e68d17fb7ae4feffa069a0341ea39
SHA256 cbe9408a5a1b72ee56736191261816ca14a7adcb522800a6dd412e27f69022cb
SHA512 a6461e557b17bbc1073dc1f5f7e7c4f57222744cc629fcc290cf7ac730ed5984ed4bec766b86837ac5fc268d21f98b383b03a6bb14af19e4745d88ab0a94457e

/data/user/0/com.android.services/databases/bot_starsds

MD5 0ad0e611fa9ed19e55b5c6ab0dcfcbfc
SHA1 8565c819f4600214338c1f9fe0c558317bebcf37
SHA256 69b286402187b7198010ce8981d91ca389ecca121b6b18e4a6b0401f76aa7305
SHA512 212cfdec10228936c8d702cad28a6ed64967f123fcfdeda562477e7209a2bc7c00879fef637fd4b5fd35a4c132c32968e6d50758fa2c15751f13f491b4d6e2b0