Analysis Overview
SHA256
e589d0944f0bbf3b9a45bdd45e9207fe444d4ff2b30a183b08dfbb0167eafe5e
Threat Level: Shows suspicious behavior
The file 9138f6c4e4425c3644ece1060909e1b9_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks if the internet connection is available
Requests dangerous framework permissions
Listens for changes in the sensor environment (might be used to detect emulation)
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-03 09:05
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-03 09:05
Reported
2024-06-03 09:08
Platform
android-x86-arm-20240514-en
Max time kernel
66s
Max time network
185s
Command Line
Signatures
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Listens for changes in the sensor environment (might be used to detect emulation)
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
framoise.in.hell.castle.run
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | api.birbira.xyz | udp |
| US | 104.21.17.160:443 | api.birbira.xyz | tcp |
| GB | 216.58.212.227:443 | tcp | |
| US | 1.1.1.1:53 | api.tridrongo.info | udp |
| US | 172.67.161.129:443 | api.tridrongo.info | tcp |
| GB | 142.250.180.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.200.46:443 | tcp | |
| GB | 142.250.180.2:443 | tcp |
Files
/storage/emulated/0/Google/google.id
| MD5 | 7d35083a667c173e5240dbac4de4e1c0 |
| SHA1 | 55dc2ad4f21dbde3393c9074629e0db8b41faba1 |
| SHA256 | 32296cf2995e56b6b3d77bb29fa1b228d2e2bd7e230dc1e0986f9b7351f2c6eb |
| SHA512 | 6e4dc7da4e8f9a2b5b6576f166780c764f59bd69f92927f7d2f271f4ce98c82dbe216094ae177884c844917f28261332209218d47ab36056f4097be312498614 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-03 09:05
Reported
2024-06-03 09:08
Platform
android-x64-20240514-en
Max time kernel
179s
Max time network
151s
Command Line
Signatures
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Listens for changes in the sensor environment (might be used to detect emulation)
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
framoise.in.hell.castle.run
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.200.10:443 | tcp | |
| GB | 172.217.169.8:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | api.birbira.xyz | udp |
| US | 104.21.17.160:443 | api.birbira.xyz | tcp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| GB | 142.250.200.46:443 | tcp | |
| US | 1.1.1.1:53 | api.tridrongo.info | udp |
| US | 104.21.66.157:443 | api.tridrongo.info | tcp |
| GB | 172.217.169.14:443 | tcp | |
| GB | 172.217.16.226:443 | tcp | |
| GB | 216.58.201.100:443 | tcp | |
| GB | 216.58.201.100:443 | tcp |
Files
/storage/emulated/0/Google/google.id
| MD5 | 63d9b4bd1531f446de8ebdb3576021a5 |
| SHA1 | 18d0ecc1442edf41ccbf755d0113d12c33db2987 |
| SHA256 | 1481b445fda60a1aee995a1694d049b077aa4645fd5946bdf800f90689811539 |
| SHA512 | c4d81d7508bcdc1a9028786ff1528b21c6a5712bcf271adff4bf0b6ec9bda0132de00600905d0b8bededc05f779c1257366e2d6287db063fe9c56acffe0358dc |