Malware Analysis Report

2025-01-19 08:06

Sample ID 240605-3wxa6acb9z
Target 9990008a86566c400661d12372e1b957_JaffaCakes118
SHA256 1aa9021999f4f916ee4aaa41b4a0352b2c31f22753431b243debb7a364aee99b
Tags
persistence discovery evasion impact
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

1aa9021999f4f916ee4aaa41b4a0352b2c31f22753431b243debb7a364aee99b

Threat Level: Likely malicious

The file 9990008a86566c400661d12372e1b957_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

persistence discovery evasion impact

Checks if the Android device is rooted.

Loads dropped Dex/Jar

Queries information about active data network

Queries information about the current Wi-Fi connection

Queries the unique device ID (IMEI, MEID, IMSI)

Requests dangerous framework permissions

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-05 23:54

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 23:52

Reported

2024-06-05 23:57

Platform

android-x86-arm-20240603-en

Max time kernel

3s

Max time network

164s

Command Line

com.lanjiyin.yaojishi

Signatures

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.lanjiyin.yaojishi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 b4f6b24e668e6915cd2b403953f986e8
SHA1 297b2f2b7455cf8fde82f1081d48d41cb157e23c
SHA256 64e77c8c6edb919c005169692eaf277de88486e77a39bc21ef0b24a039e8867d
SHA512 8c0adf67882791a8a5464ed5385839f3a2b98d318cdf835787e778d50301b1a119e11f70b4cc534557a1937eff8314bc69f3da2d1c24cb2a74196b193d88f167

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-shm

MD5 cf845a781c107ec1346e849c9dd1b7e8
SHA1 b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA256 18619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA512 4802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-wal

MD5 ba64a0350256d18f014b5fde5be58d60
SHA1 2d23fea2c2cf35463294d12c52f70ee3411f6ff4
SHA256 91751fefed8375af1157a3fc0cf5f8a56ff23d0233958935c07b9376cdc3f179
SHA512 3b662bbb6e795d19f0c3e7b88762268ab3dc3c6d0e2296b86f41eac61a8a11cd99628e8d5b292a2e3e3868bfd7361479f71a09e617bcbc280e5a9abd1d555e98

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-05 23:52

Reported

2024-06-05 23:57

Platform

android-x64-20240603-en

Max time kernel

10s

Max time network

129s

Command Line

com.lanjiyin.yaojishi

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/app/Superuser.apk N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /product/framework/com.google.android.maps.jar N/A N/A
N/A /product/framework/com.google.android.maps.jar N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.lanjiyin.yaojishi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.169.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.bugly.qq.com udp
CN 14.22.7.140:80 android.bugly.qq.com tcp
GB 142.250.187.234:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 142.250.200.34:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 172.217.169.14:443 tcp

Files

/product/framework/com.google.android.maps.jar

MD5 4899aca36d1ed747a447dcac0d101a62
SHA1 32e43edc0bf3e036683ea8639472e6cd31ab9929
SHA256 67a651acd867e046fb4463b31ea584c1468f7243a9d1e2efd34059e8ee2f130f
SHA512 50b23dd279a9efba566c6a6523c7537723c0cd6dd3e4871f1cbdb8d5bc355caa3ddea99452b1c8e5356802f812b3768066a9848b93d715bb8bdfa455b704285f

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 b5ca49c3c6ddac3c175faa72231d015b
SHA1 c27387528b05b80a7b8d55f3b9895e245c6a4a9c
SHA256 a88b4e94b1db5818ffbb3347ec0812926225b3af9011392fd0e551dda4c252fe
SHA512 c246e08cece8d63b3b753b2485e19540e4a112f3da17c71ca5f8431fd844d629163682461706c62d4cfca559d0af7b30821bdfe81764357fc7e32e1b094d3f3a

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu

MD5 4356218055d847a9f0d2b5bb83df85a8
SHA1 34bc7132a173e438bfc2d33e374772704bd8df0a
SHA256 ad60e414dfdc93ae1b85ef40e2f46ef67cad5c3734a9994ed32d29ba4803758c
SHA512 e73fd82f04f2a58e67225ef650701a0e56e8b855aae213c29d8866a8c865970bfdc849c96a60094f628215868f729efed7fe475daf3e195c652b9e28ad2d602f

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 96e688930bb6ddef800e5b86c64a4494
SHA1 9cebe21f827c3958fa21a63010928df9ef9600a5
SHA256 05744f3f0a4aba4327bfd0a66826d7158bd2f4de39e8f53a34f4c9593fa4a126
SHA512 c8fc53a835f8d190974e352c391b59a88fa67742ebe015da1d41b8a4ef3eece6176ef9c556971f09dc0aa6a17beb18b9b03dfec374b52c4c90062c257b9ccd98

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 1fcd92a3e322fb1400ad0e9b6468368c
SHA1 2e34bb1e08bfa12692b7271e079339556c3ec28c
SHA256 3084ae7e248a813a15a7d46ee6475896dd6db9133c3a427ad4db082a7339df28
SHA512 6ae205a3da0e2062a99fbd5a47e1b6b7ff2969a9d0f058a20402a54a7b48d1bd1df82ca093a3988e70947bc588bd6aaf8e06315cc8f3e6bd028303c3ccf3ba22

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 08311b86de36b9d20b3a43d5d5d1b68b
SHA1 8029f6cb71c0d8b51bde08fb796d74762fed2362
SHA256 82470d653c1df3fa5f7b5b288bb737b7c5ea54cd1dc21532a860822a2fd6580f
SHA512 46f239dfbba15c6d3c566cb1bd6cc8fc7fd6939c7a9a47c44d858e807d938b4366d1fcecdfe84f4de931d35f57ca78e74af5a40aa47c4e09674e07add9855854

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 4b0a869bcce6ff43860913cd0da23341
SHA1 3006d6e924509baf666e83f9145b351646cb623f
SHA256 d647c40a20e0bc37da1b6b43f859768f03e9a4a81f9b1d50b40d9744085bc04d
SHA512 ee3ae9538a6b8b0f798ba1e6cc1517fff740478398087347cd156b76f43f736be361993bee1da33e405dbf2547a8feb41df6e2fa090a724b133d72d5c9c858c6

/data/data/com.lanjiyin.yaojishi/databases/bugly_db_legu-journal

MD5 c3c2937ff13ff1a349a497b7585da2fe
SHA1 4b483d0c91eaa2188a66d4e791043090229974d9
SHA256 5403888566adee80585d0e1f36bf34403760c8afbc0d8c609fc2278ca65f2719
SHA512 0c47567906703f88de0255bea2cd041af95a10d2241264b54930764f6b0dacedabdc299137dab1b3abb2098b2831746b696147a53e7c532f4d89ffd77304e070

/data/data/com.lanjiyin.yaojishi/app_bugly/tomb_1717631678814.txt

MD5 bd0f8f8f3ad93fa07623422ec6e72003
SHA1 c3589295e7a4ddcf35bcd7a2c13bfd381783821a
SHA256 7fe875398dea7537a57a77c5275cbc8647aaf63ab6fd9148443b65df2e1d0647
SHA512 2ec3e073321262b667afbf98fe4e9f51e4c0c58baaad506b120239031f10699d699b94470bef13007bd6199df3d3b03f1eaf147c0cba5178aee7e267072b1c0b

/data/data/com.lanjiyin.yaojishi/app_bugly/rqd_record.eup

MD5 02e9d601c41be7da9dbfceef855395ea
SHA1 7bccd0f074e1f9a58edab8b2601fe02b4acfa821
SHA256 316b157a30d3848d85760ccc122a4cbf5d7f32138b59eb13a4e38cfecbaedc37
SHA512 1c7a7801df217f91c1e2a32c5d4b9550923728aab416b2b858e201233408ae948f6f30ec4514d307263c455d1a63a76e925bfd6c185eabb98d93aeb4a9d0bfe8

/data/data/com.lanjiyin.yaojishi/app_bugly/rqd_record.eup

MD5 a2ddf48493001922d0383f64db5eb273
SHA1 c19cd8bca24cbe6fa498f38bc8ec05f3bb90afa8
SHA256 b25e2ed1d175adb4cd4da418f7d5258cdb3db831f8d6b905408ead6ecc1b008e
SHA512 5bcc9ea5d9693f7be2b8e1c0862429aba3220db175eacff75d81153e380a0a6cc7cdc870144a15aa9d84392a72be431449235ed282bab6a0dc9e77c1a20ee6ef