Analysis Overview
SHA256
78579aa317c541bb115f1e496ae25dbce0678d69b2b905dbc1c8481eb6b0e235
Threat Level: Likely malicious
The file 9783a7db5c9150b8b5a39e9f558eb0d3_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Checks if the Android device is rooted.
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about the current nearby Wi-Fi networks
Requests cell location
Reads information about phone network operator.
Requests dangerous framework permissions
Queries information about active data network
Queries information about the current Wi-Fi connection
Uses Crypto APIs (Might try to encrypt user data)
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-05 07:43
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-05 07:43
Reported
2024-06-05 07:48
Platform
android-x86-arm-20240603-en
Max time kernel
10s
Max time network
131s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /system/bin/su | N/A | N/A |
| N/A | /system/xbin/su | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about the current nearby Wi-Fi networks
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getScanResults | N/A | N/A |
Requests cell location
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getCellLocation | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Processes
com.twoyao.ybsprot
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.179.234:443 | tcp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | open-vip.bmob.cn | udp |
| GB | 172.217.16.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.204.78:443 | android.apis.google.com | tcp |
Files
/data/data/com.twoyao.ybsprot/databases/bmob_provider.db-journal
| MD5 | 18d893bf2ac3124135466441d5b0eeb6 |
| SHA1 | 730960823b310d65887a0d1056ef34e036d27c3f |
| SHA256 | 83f3d79326ebdd324c190a4b5a6df3dc9b4fa3b8c0934440b4899d05539a8bc6 |
| SHA512 | 0bf4a5b8671faf59dd58f840b47659d6be14153b72ce3722a12fd74af7144870675f5d1cbfd8f5f8d1b13d2135926b9a752a383f006fc53efe31dc9fb80be5c4 |
/data/data/com.twoyao.ybsprot/databases/bmob_provider.db
| MD5 | f2b4b0190b9f384ca885f0c8c9b14700 |
| SHA1 | 934ff2646757b5b6e7f20f6a0aa76c7f995d9361 |
| SHA256 | 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514 |
| SHA512 | ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1 |
/data/data/com.twoyao.ybsprot/databases/bmob_provider.db-shm
| MD5 | bb7df04e1b0a2570657527a7e108ae23 |
| SHA1 | 5188431849b4613152fd7bdba6a3ff0a4fd6424b |
| SHA256 | c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479 |
| SHA512 | 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012 |
/data/data/com.twoyao.ybsprot/databases/bmob_provider.db-wal
| MD5 | 2bc5b43b71f0461d1e4250a4ad59f2cf |
| SHA1 | fd71f0b676de5367b6e49e1778d10c1e3736d7b7 |
| SHA256 | 0591db580adf4d849d4c997b97ebc15e07844a2434d9efbf685a85fd134a477f |
| SHA512 | f6961987c7a522ca29fd4f06afb21f32ed614f7923763f2ab9593f0bb78f555099e29b6ed9705b1defce6b04957d5c6fbe6179a2e6492332f7c06c60873c2a62 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-05 07:43
Reported
2024-06-05 07:48
Platform
android-x64-arm64-20240603-en
Max time kernel
6s
Max time network
132s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /system/bin/su | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about the current nearby Wi-Fi networks
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getScanResults | N/A | N/A |
Requests cell location
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getCellLocation | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Processes
com.twoyao.ybsprot
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 172.217.16.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | open-vip.bmob.cn | udp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.204.72:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | sportsnba.qq.com | udp |
| GB | 216.58.212.196:443 | tcp | |
| GB | 216.58.212.196:443 | tcp |
Files
/data/user/0/com.twoyao.ybsprot/databases/bmob_provider.db-journal
| MD5 | acacc024e60bfa2e9a876eb54eda29bc |
| SHA1 | daff99d9ec64765534922b88b966e019906118a4 |
| SHA256 | a5f143e10b24468572e8f76495fb601b13629cbc3dbce36490119f1944d49ed6 |
| SHA512 | 2220e077e46e86485b64631d62309c807480b1e671bb9a1f0ce44695310d90fd2486260adee760a64056b927561fb2663c5f03022f2208c25600c0aee282a279 |
/data/user/0/com.twoyao.ybsprot/databases/bmob_provider.db
| MD5 | 2278e12bd393d9b8a5d1c5e882db7d89 |
| SHA1 | c1ca5efe48b44422927221ae3b2b7306245b4f60 |
| SHA256 | d94d4348d5a0196c626780b0b6fc73438c33e2ecc765e2a92674e06d5c7063fb |
| SHA512 | 80c1481b0d1dd31b99c35eb25033e7891a0b400be8287d557770b8b24a14612eb65cf05bf47022aa7de966f575787bac16a600f0c401b510914faba5ea7b55db |
/data/user/0/com.twoyao.ybsprot/databases/bmob_provider.db-journal
| MD5 | 3468778f4cc7df477b99f6d7e4f66d6c |
| SHA1 | d85ef3a90dc8bd8fd3e6f7cdc72ce7a3a1987663 |
| SHA256 | 4bf18dafbef72b8e245dc6b42791df2fe8ded8eceba52fe5ff5c362d6aed2819 |
| SHA512 | a446cd66e0d9e9dd934043d167c6d61306ec5dcee93c4460424fd499da56953a29e665c6158e3d04e778edad8749be9dc8f62251360d24662901cf014db727c5 |
/data/user/0/com.twoyao.ybsprot/databases/bmob_provider.db-journal
| MD5 | 4f30ea3d6acb8a8f332ab1ed0f302c8d |
| SHA1 | 9596b43cbc3a02174656a9057d6cb933a3f79ac9 |
| SHA256 | 8c4428f656fbb34d64731885c65c4e3a803fab7c49082f229f8490e99f63d730 |
| SHA512 | f8a19f9efcc9c8a5ca7ffc4a9e60210282c8bba1f41ef09a6e0e49d2021c649839fb16de569efded958b57ec18dd75ba64fddafad6814db212162ad9cd9c9704 |