Malware Analysis Report

2024-09-09 17:57

Sample ID 240528-1zbshsfd75
Target 6f7afa5145194ce907eb9e4eedc9ffb8883e9f0203f611318693e9a8a8166bd9.bin
SHA256 6f7afa5145194ce907eb9e4eedc9ffb8883e9f0203f611318693e9a8a8166bd9
Tags
discovery evasion execution impact persistence privilege_escalation
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

6f7afa5145194ce907eb9e4eedc9ffb8883e9f0203f611318693e9a8a8166bd9

Threat Level: Shows suspicious behavior

The file 6f7afa5145194ce907eb9e4eedc9ffb8883e9f0203f611318693e9a8a8166bd9.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion execution impact persistence privilege_escalation

Loads dropped Dex/Jar

Registers a broadcast receiver at runtime (usually for listening for system events)

Queries the phone number (MSISDN for GSM devices)

Tries to add a device administrator.

Declares broadcast receivers with permission to handle system events

Checks if the internet connection is available

Reads information about phone network operator.

Requests disabling of battery optimizations (often used to enable hiding in the background).

Schedules tasks to execute at a specified time

Requests dangerous framework permissions

Acquires the wake lock

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-28 22:04

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 22:04

Reported

2024-05-28 22:20

Platform

android-x86-arm-20240514-en

Max time kernel

3s

Max time network

130s

Command Line

com.tencent.express

Signatures

N/A

Processes

com.tencent.express

Network

Country Destination Domain Proto
GB 142.250.200.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.204.67:443 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 22:04

Reported

2024-05-28 22:20

Platform

android-x86-arm-20240514-en

Max time kernel

179s

Max time network

162s

Command Line

com.tencent.shopcj

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.tencent.shopcj/files/arm/classes.dex N/A N/A
N/A /data/user/0/com.tencent.shopcj/files/arm/classes.dex N/A N/A
N/A /data/user/0/com.tencent.shopcj/files/arm/classes.dex N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

com.tencent.shopcj

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.shopcj/files/arm/classes.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tencent.shopcj/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
GB 142.250.200.42:443 tcp
GB 142.250.178.10:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 www.google.com udp
GB 216.58.201.100:443 www.google.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 www.ilogenonh.com udp
KR 103.151.229.36:80 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 tcp
GB 172.217.169.66:443 tcp
GB 142.250.179.238:443 tcp

Files

/data/data/com.tencent.shopcj/files/arm/classes.dex

MD5 d46ea9fc5e1d684ac0041c60a40eadd9
SHA1 51137bdda194a0dad0ccf58670716289a9194bab
SHA256 92570988ae70869f869f179dcf26cda133d42b4ab7c9fbe991cec6620dcf9e47
SHA512 6f4a0b28839dd4115f3f0bad93a195ba156ad41726883875d0fc22a5625b96c48de4ac50e5b71a21a994173f90f881c9159f75dace3702673a94d58348d1794d

/data/user/0/com.tencent.shopcj/files/arm/classes.dex

MD5 994f579005954064763a06583f11240e
SHA1 acad628336ecf1040e6cc874f4173f208538c9c1
SHA256 91255a585ca29fbdb1e05e1bf0e92a8ced3292d6c0988bd9888caa67c1b7046a
SHA512 a3cea48e3db55a491170f108320899d4a5bea7f1b7b8f160aaca13f8634aff06fb64703539b142422e4f2cd341a7e04292dd170907528d31eede8555469e433c