Analysis Overview
SHA256
166127f03dca485f9c5925ba8144ce266dabd04596cdf20b92fcb2ae727e881c
Threat Level: Shows suspicious behavior
The file 9785c8d18592744e6b2be2a351c42735_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Requests cell location
Queries information about active data network
Queries information about the current Wi-Fi connection
Requests dangerous framework permissions
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-05 07:47
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-05 07:47
Reported
2024-06-05 07:50
Platform
android-x86-arm-20240603-en
Max time kernel
3s
Max time network
131s
Command Line
Signatures
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Processes
com.zhongzi.taomanjia
chmod 755 /data/user/0/com.zhongzi.taomanjia/.jiagu/libjiagu.so
/system/bin/dex2oat --instruction-set=x86 --dex-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes.dex --dex-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes2.dex --oat-file=/data/data/com.zhongzi.taomanjia/.jiagu/classes.oat --inline-depth-limit=0 --compiler-filter=speed
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
Files
/data/data/com.zhongzi.taomanjia/.jiagu/libjiagu.so
| MD5 | 0f988c9a7d52923d162bbfe4d2ea8171 |
| SHA1 | 0084318df7665847bc5cabac2f4b7cd2bdc02a34 |
| SHA256 | c548db6ffa4e11cf80c934aeb77d40397e7aeed067a89799262467d552921bce |
| SHA512 | 926bbdc706705674e3cd19186990b5c30d1b7b7141c6dd7ace9876899f2bd92275793a5b76e7becc8c6de82766a3dd075ebab9fd8ccb11d3e077b49c613774b9 |
/data/data/com.zhongzi.taomanjia/.jiagu/classes.dex
| MD5 | db33c76b23188d3a4d69eb192cdc52cb |
| SHA1 | 4ccdf48482d0e3ca211af46f659778e0f854d421 |
| SHA256 | 21673606919917d380157b956f7c43362afd00c43b48b9577de0eeceda8123e9 |
| SHA512 | 0993bcbbdbc6c4886531dfab1bc672ccaeefb14fa9d71071e38e851a46720f76a2820e506423bd4fd1276ee1939e8ae60ef0ab5957530529db3a6ee2b9a99793 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-05 07:47
Reported
2024-06-05 07:50
Platform
android-33-x64-arm64-20240603-en
Max time kernel
7s
Max time network
170s
Command Line
Signatures
Processes
com.zhongzi.taomanjia
Network
| Country | Destination | Domain | Proto |
| GB | 142.250.187.228:443 | udp | |
| GB | 142.250.187.228:443 | udp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.212.227:443 | tcp | |
| US | 172.64.41.3:443 | tcp | |
| US | 172.64.41.3:443 | tcp | |
| GB | 142.250.180.3:443 | tcp | |
| US | 172.64.41.3:443 | udp | |
| GB | 142.250.180.3:443 | udp | |
| GB | 142.250.187.228:443 | udp | |
| GB | 142.250.180.4:443 | tcp |
Files
/data/user/0/com.zhongzi.taomanjia/.jiagu/libjiagu.so
| MD5 | 5ce15e89695276eacc1c34b4a64d029f |
| SHA1 | 5b16044e4aa1e1965d8305475f463368fec88448 |
| SHA256 | 872c68c95f8105efc1bf31157673a73b8575f4a1b723b22e3d695d3929fd85d3 |
| SHA512 | 3b35198a18ec88f4c13e9532642d8226d5934fa4578369facb956d255c21426df10976568dc0a576c8514753ce208fd61819495109b58668a009e961cc52a1bc |
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-05 07:47
Reported
2024-06-05 07:50
Platform
android-x86-arm-20240603-en
Max time kernel
2s
Max time network
157s
Command Line
Signatures
Requests cell location
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getCellLocation | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Processes
com.alipay.android.app
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.178.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |