Malware Analysis Report

2024-10-19 13:18

Sample ID 240602-dm86xshd72
Target 8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118
SHA256 4d3d8ebdff912f1afda9270db18f77d5d3c5c8eaa9e423ccd68d2ea68fa62003
Tags
discovery evasion persistence collection credential_access impact
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

4d3d8ebdff912f1afda9270db18f77d5d3c5c8eaa9e423ccd68d2ea68fa62003

Threat Level: Shows suspicious behavior

The file 8cb5cc9d531f6a648f533cc06af218a3_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion persistence collection credential_access impact

Checks memory information

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Obtains sensitive information copied to the device clipboard

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 03:08

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 03:08

Reported

2024-06-02 03:11

Platform

android-x86-arm-20240514-en

Max time kernel

19s

Max time network

156s

Command Line

jp.uxdesigntokyo.moepunchfree

Signatures

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

jp.uxdesigntokyo.moepunchfree

Network

Country Destination Domain Proto
GB 142.250.200.42:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 www.google.com udp
GB 142.250.179.228:443 www.google.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 172.217.169.66:443 tcp

Files

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 17c3c6f886de4d75103444377a0af642
SHA1 c5f685f1c12083f642a57973972eb8dfd740a9d7
SHA256 1f429fc82f4c319c704936137eaab6056a0f8ea8eaeee422f080d9d9aae38a5f
SHA512 89bebfc30fad6f729075edb56f00e075b62b65aed26240befecd278de4a711382966b47c1dffdec29918a21203aabb6baa06de3d5c6c29d27b5eba858901516a

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-wal

MD5 6357d03047de43cd010c0e860e287a4f
SHA1 b901c6ffb241e7a29a9f6f09f89f7d2fe089eff3
SHA256 0c00bf0b69fc0c481a06d585a740943f55ba2c963f3137b82278291d915c76a5
SHA512 f5ca9f91cc99a270d7e4161d7dcdf10d6d78f36815e322af00413101dc6c506831ace2cfc41fc7c33bd5c724b77f312991dbe2de4fde0b9ad2ce3351958b2c5c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 03:08

Reported

2024-06-02 03:11

Platform

android-x64-20240514-en

Max time kernel

49s

Max time network

154s

Command Line

jp.uxdesigntokyo.moepunchfree

Signatures

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

jp.uxdesigntokyo.moepunchfree

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.213.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.213.14:443 tcp
GB 216.58.212.194:443 tcp
GB 142.250.180.14:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 f26d23f93f2358302e9430f369a14835
SHA1 ad43e52328c2c6b4821cc97e4297aac0e995f018
SHA256 679a25568845367c7662115555cea5d9c05bae51b7380838ce8bbdf3cbbb6aaf
SHA512 48691e9ede80ac1b10a65c956a77b76517142927f21bb22697b066c4654cac064d81dcf5dbd966fe76393ba070209fd6d71ee6e8a9090e68332ed81c96901eaa

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE

MD5 7b96a9a688fe953c1e84597e5422a584
SHA1 72832e50e06d8a56863522fe7459fe798f8c6857
SHA256 f5c4162144d2db181d51a7e522dc4b3037c0472b6cbf0cfd9b305627cbce7250
SHA512 2460c172cd522f228116a6bf3084664074d1cf5fc70ad021c40b3b136a0478011b4e1e755ae01cf95a3d6bc9c7659d6e93be7edc51a360ebb189d5288ea65ed5

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 1e2caa109e36edd90cb428e5213e99ff
SHA1 7ad19805cded71fab79b5db9ceee107e4e364581
SHA256 7fa52ca4aa129aebb476cf52703f2ff88afd4b119d536cd1deca10a15c1edc3e
SHA512 ff7a372a33e7da3090be86fa803c0754e027cc80a33a9cf6d1f327fbc86810f1eb0e7eec5be61e2a1ba5af5cb14c5fec919dfd52f2205bf672f2f7d12a6287a8

/data/data/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 c1639062e5945b3a3df13a260d34cb1e
SHA1 4b66d45c53f97f32e4578996173b7c05d5625bd2
SHA256 5dae5e732e30672efb37fbd657d17094d69df4b5dd7c3df42f246a1ee52f6300
SHA512 c1a5f52e34edf3421deaf1cda8a0d4cc9a6f1be3cca32fc9619cf621c2692a16dea77814ef90a502aa0d48b355b7cfd136cea07f5ceffd276e384889a8ff6150

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-02 03:08

Reported

2024-06-02 03:11

Platform

android-x64-arm64-20240514-en

Max time kernel

58s

Max time network

133s

Command Line

jp.uxdesigntokyo.moepunchfree

Signatures

Checks memory information

evasion discovery
Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Processes

jp.uxdesigntokyo.moepunchfree

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 172.217.169.68:443 www.google.com tcp

Files

/data/user/0/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 667b6d33ab27a8bdd1832b296ade61ea
SHA1 3168374ee3b64786b9c64f1bd1f2f15b23f7d74b
SHA256 dd5f4da619538d0369e02abac333566fb120bc25aab14a9f6ab33fb5785b5cea
SHA512 6b9ca8c79ca8bd8d6e1aa2fd1cea237a458500585168a327b77814d602096c6dc842cfaa549dfe09d065ab2b49ca9e4c00951a7e99935f5326b8c352eb614c89

/data/user/0/jp.uxdesigntokyo.moepunchfree/databases/VOICE

MD5 ea044fa9dbb0bbc73eca7d7abca80e84
SHA1 ac6ad1c20be03585b96e1a16e79bd46a3ff324c9
SHA256 93d5566a6483f10f501f70f81477a350bd08f2e707f85cbe25bd6b8a4620a040
SHA512 22062f4aebcfcdbd53d402eb54540a5779d3e49e841d782ad056705a72766590a5e168e2a7f81c0ed5ca0c8b479f6c51e4b0f3e3d54dd49457b3b5b48478576f

/data/user/0/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 c9495a9aa9a9dcb05896fef734ea5b18
SHA1 f056c4f6054816162df566f042c5c83516df0084
SHA256 590194a70d0089eb5860eefe939c6fb45a991f50674047716709a5f9caf4d6b9
SHA512 3c812de61332fa809cd13541b65e9456c8c36db346ce97e952352e38f3e41b9a3d4f375918a70e33da653ba00b8d51dbb24f8e9bf712a717dff59eb5da78183e

/data/user/0/jp.uxdesigntokyo.moepunchfree/databases/VOICE-journal

MD5 19d3cd6faaaf0cebf30ff0ae904acdb2
SHA1 cc36344ce700818a11422c9e6b2a4a9a86870ade
SHA256 d5fee8eedd3a6915911994d2a2703798d59fd961721083be4fc970ca531640b1
SHA512 15294b9fbc0909722da82497eceee3db5cb5ebcd01d119b17f618a83bf281fca265e9c4749e43c2da364981eb455dc75ff927a11b4dcb1b7bc5cd99cf678520a