Malware Analysis Report

2024-07-28 14:45

Sample ID 240601-tzqs4sgf4v
Target 8b0c89faf2b07b6ba36f7a81b7c79bbc_JaffaCakes118
SHA256 51d55e7e57b18fe8f4bd5f2b30566063b634c7f9b1efbee083407e29ec6446c3
Tags
banker collection discovery evasion impact privilege_escalation stealth trojan persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

51d55e7e57b18fe8f4bd5f2b30566063b634c7f9b1efbee083407e29ec6446c3

Threat Level: Likely malicious

The file 8b0c89faf2b07b6ba36f7a81b7c79bbc_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion impact privilege_escalation stealth trojan persistence

Requests cell location

Removes its main activity from the application launcher

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Loads dropped Dex/Jar

Checks CPU information

Queries the mobile country code (MCC)

Queries the phone number (MSISDN for GSM devices)

Registers a broadcast receiver at runtime (usually for listening for system events)

Tries to add a device administrator.

Queries information about the current Wi-Fi connection

Queries account information for other applications stored on the device

Checks known Qemu pipes.

Queries the unique device ID (IMEI, MEID, IMSI)

Checks if the internet connection is available

Acquires the wake lock

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Reads information about phone network operator.

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-01 16:29

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-01 16:29

Reported

2024-06-01 16:33

Platform

android-x64-arm64-20240514-en

Max time kernel

179s

Max time network

182s

Command Line

com.vaukcxeuyx.lvfzcrplmxu

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks known Qemu pipes.

evasion
Description Indicator Process Target
N/A /dev/socket/qemud N/A N/A
N/A /dev/qemu_pipe N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.vaukcxeuyx.lvfzcrplmxu

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:443 www.google.com tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp

Files

/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 98edb99186a9ad3e4f164e35118a85d0
SHA1 4cbb0a10d6aea00b7bcc588460348f24793f8d4c
SHA256 6a568079d8281fc451e377c6f37a1f7e5f1d98acfe3918603addada434f1b3c0
SHA512 a63c4e43a8fce749d9fc7d4252790c78335069b533696ad67afa1541b32206c7117a35acaddb664960a42450d24ac7fb4902d8eb8731651e01279fea8ee4e990

/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 c95df19d6d33737c16036c9780c884eb
SHA1 1d12570e83369d36eff19a17348197b67a41b30f
SHA256 5a442bd439821f13ab9a7d5dc6b6b5c85080d367cd6bd4266ffc9c826eec851d
SHA512 de70b8aa435cf97e2f93b9ebf613b8ba1f7020257adc735a6601c040a2b433ec2b4bbaa72c42da5913528d9888714a9576b53bce08c833369fa69032cecd1ef3

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 16:29

Reported

2024-06-01 16:33

Platform

android-x86-arm-20240514-en

Max time kernel

179s

Max time network

182s

Command Line

com.vaukcxeuyx.lvfzcrplmxu

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks known Qemu pipes.

evasion
Description Indicator Process Target
N/A /dev/socket/qemud N/A N/A
N/A /dev/qemu_pipe N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar N/A N/A
N/A /data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccounts N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.vaukcxeuyx.lvfzcrplmxu

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/oat/x86/dtkfskytdr.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 142.250.187.206:443 tcp
DE 94.130.173.168:8543 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp

Files

/data/data/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 98edb99186a9ad3e4f164e35118a85d0
SHA1 4cbb0a10d6aea00b7bcc588460348f24793f8d4c
SHA256 6a568079d8281fc451e377c6f37a1f7e5f1d98acfe3918603addada434f1b3c0
SHA512 a63c4e43a8fce749d9fc7d4252790c78335069b533696ad67afa1541b32206c7117a35acaddb664960a42450d24ac7fb4902d8eb8731651e01279fea8ee4e990

/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 c95df19d6d33737c16036c9780c884eb
SHA1 1d12570e83369d36eff19a17348197b67a41b30f
SHA256 5a442bd439821f13ab9a7d5dc6b6b5c85080d367cd6bd4266ffc9c826eec851d
SHA512 de70b8aa435cf97e2f93b9ebf613b8ba1f7020257adc735a6601c040a2b433ec2b4bbaa72c42da5913528d9888714a9576b53bce08c833369fa69032cecd1ef3

/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 c341e79bf4c322fe506c5a215ff1f9f9
SHA1 a03d21ab8c612ff6ef549603f790a776a3a3d763
SHA256 2d3ae8cb24a2cd74687439b7be105d0f5b49792ff69b8c43870275bb37137b07
SHA512 1412500629e6ef11fe15a670225f1f08eedc7d7e817a388547a82a81e50e72069e99eced629d738b6e7ab366ae9eb5bfa9202b53f1c98fecac94354852a7dd58

/data/data/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/oat/dtkfskytdr.jar.cur.prof

MD5 c63420882f37dfd43885c81fe89ac897
SHA1 0d7911287d196c1022f5778fbdad40452ec5179c
SHA256 352f42171522f0f24501ba3b85821cb98c9072573c1d9cc8cd3c63f351d083fe
SHA512 8fd287fa37fec17e87192933cdb86891621daecd5ca5f0c93c21915382fabd08aeb262b933e216ce02696bba7d9d9278ea87db421b69fa1f0ce91225b0479cd3

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-01 16:29

Reported

2024-06-01 16:33

Platform

android-x64-20240514-en

Max time kernel

179s

Max time network

183s

Command Line

com.vaukcxeuyx.lvfzcrplmxu

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Checks CPU information

evasion discovery
Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks known Qemu pipes.

evasion
Description Indicator Process Target
N/A /dev/socket/qemud N/A N/A
N/A /dev/qemu_pipe N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccounts N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Processes

com.vaukcxeuyx.lvfzcrplmxu

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.201.110:443 android.apis.google.com tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.201.106:443 semanticlocation-pa.googleapis.com tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
GB 142.250.187.238:443 tcp
GB 142.250.200.2:443 tcp
DE 94.130.173.168:8543 tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.201.100:443 www.google.com tcp
GB 216.58.201.106:443 semanticlocation-pa.googleapis.com tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp
DE 94.130.173.168:8543 tcp

Files

/data/data/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 98edb99186a9ad3e4f164e35118a85d0
SHA1 4cbb0a10d6aea00b7bcc588460348f24793f8d4c
SHA256 6a568079d8281fc451e377c6f37a1f7e5f1d98acfe3918603addada434f1b3c0
SHA512 a63c4e43a8fce749d9fc7d4252790c78335069b533696ad67afa1541b32206c7117a35acaddb664960a42450d24ac7fb4902d8eb8731651e01279fea8ee4e990

/data/user/0/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/dtkfskytdr.jar

MD5 c95df19d6d33737c16036c9780c884eb
SHA1 1d12570e83369d36eff19a17348197b67a41b30f
SHA256 5a442bd439821f13ab9a7d5dc6b6b5c85080d367cd6bd4266ffc9c826eec851d
SHA512 de70b8aa435cf97e2f93b9ebf613b8ba1f7020257adc735a6601c040a2b433ec2b4bbaa72c42da5913528d9888714a9576b53bce08c833369fa69032cecd1ef3

/data/data/com.vaukcxeuyx.lvfzcrplmxu/app_wybrolv/oat/dtkfskytdr.jar.cur.prof

MD5 bac636140998ad2e895c7eb83a3472d1
SHA1 4830efc3e7bcbefc6ed4dbe547a0520703126e29
SHA256 c909f7a9b7f8e82c69f95062976892e11c51760f4899fc424bba4355a0cdcef8
SHA512 9b5111d5d6ea61d03c657ee3e1dda9ded0ed711b19a6aae637e949ec2d6b795c0c6c0884c464e35a41b3e25f9bba5515e3c45e0c0157408440d8fd461ae42104