Malware Analysis Report

2025-01-19 05:04

Sample ID 240605-jmtdcsaa5t
Target 9785c8d18592744e6b2be2a351c42735_JaffaCakes118
SHA256 166127f03dca485f9c5925ba8144ce266dabd04596cdf20b92fcb2ae727e881c
Tags
discovery collection evasion
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

166127f03dca485f9c5925ba8144ce266dabd04596cdf20b92fcb2ae727e881c

Threat Level: Shows suspicious behavior

The file 9785c8d18592744e6b2be2a351c42735_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery collection evasion

Requests cell location

Queries information about active data network

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-05 07:47

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 07:47

Reported

2024-06-05 07:50

Platform

android-x86-arm-20240603-en

Max time kernel

3s

Max time network

131s

Command Line

com.zhongzi.taomanjia

Signatures

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.zhongzi.taomanjia

chmod 755 /data/user/0/com.zhongzi.taomanjia/.jiagu/libjiagu.so

/system/bin/dex2oat --instruction-set=x86 --dex-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes.dex --dex-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes2.dex --oat-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes.oat --inline-depth-limit=0 --compiler-filter=speed

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp

Files

/data/data/com.zhongzi.taomanjia/.jiagu/libjiagu.so

MD5 0f988c9a7d52923d162bbfe4d2ea8171
SHA1 0084318df7665847bc5cabac2f4b7cd2bdc02a34
SHA256 c548db6ffa4e11cf80c934aeb77d40397e7aeed067a89799262467d552921bce
SHA512 926bbdc706705674e3cd19186990b5c30d1b7b7141c6dd7ace9876899f2bd92275793a5b76e7becc8c6de82766a3dd075ebab9fd8ccb11d3e077b49c613774b9

/data/data/com.zhongzi.taomanjia/.jiagu/classes.dex

MD5 db33c76b23188d3a4d69eb192cdc52cb
SHA1 4ccdf48482d0e3ca211af46f659778e0f854d421
SHA256 21673606919917d380157b956f7c43362afd00c43b48b9577de0eeceda8123e9
SHA512 0993bcbbdbc6c4886531dfab1bc672ccaeefb14fa9d71071e38e851a46720f76a2820e506423bd4fd1276ee1939e8ae60ef0ab5957530529db3a6ee2b9a99793

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-05 07:47

Reported

2024-06-05 07:50

Platform

android-33-x64-arm64-20240603-en

Max time kernel

7s

Max time network

170s

Command Line

com.zhongzi.taomanjia

Signatures

N/A

Processes

com.zhongzi.taomanjia

Network

Country Destination Domain Proto
GB 142.250.187.228:443 udp
GB 142.250.187.228:443 udp
N/A 224.0.0.251:5353 udp
GB 216.58.212.227:443 tcp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
GB 142.250.180.3:443 tcp
US 172.64.41.3:443 udp
GB 142.250.180.3:443 udp
GB 142.250.187.228:443 udp
GB 142.250.180.4:443 tcp

Files

/data/user/0/com.zhongzi.taomanjia/.jiagu/libjiagu.so

MD5 5ce15e89695276eacc1c34b4a64d029f
SHA1 5b16044e4aa1e1965d8305475f463368fec88448
SHA256 872c68c95f8105efc1bf31157673a73b8575f4a1b723b22e3d695d3929fd85d3
SHA512 3b35198a18ec88f4c13e9532642d8226d5934fa4578369facb956d255c21426df10976568dc0a576c8514753ce208fd61819495109b58668a009e961cc52a1bc

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-05 07:47

Reported

2024-06-05 07:50

Platform

android-x86-arm-20240603-en

Max time kernel

2s

Max time network

157s

Command Line

com.alipay.android.app

Signatures

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Processes

com.alipay.android.app

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp

Files

N/A