Malware Analysis Report

2025-01-19 08:08

Sample ID 240605-ydkr7age89
Target 990c793ea820d2dce04ae954ff3b668a_JaffaCakes118
SHA256 ca5ca7bb26f321bca172429b961b0fde2b0a5a471f0896449914c7c349fa264a
Tags
discovery evasion impact
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

ca5ca7bb26f321bca172429b961b0fde2b0a5a471f0896449914c7c349fa264a

Threat Level: Shows suspicious behavior

The file 990c793ea820d2dce04ae954ff3b668a_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion impact

Loads dropped Dex/Jar

Queries information about active data network

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-05 19:40

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 19:40

Reported

2024-06-05 19:50

Platform

android-x86-arm-20240603-en

Max time kernel

179s

Max time network

179s

Command Line

com.um.mplayer

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.um.mplayer/cache/3924886416.jar N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.um.mplayer

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 youbo.sxsapp.com udp
US 1.1.1.1:53 uactlog.sxsapp.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.201.110:443 tcp
GB 142.250.187.194:443 tcp

Files

/storage/emulated/0/.umsecuritydata

MD5 85192cd9c3e68d0ac962b4b44decdc8e
SHA1 bad4847f848c3f1728e4e77fee061872f77953b2
SHA256 954acd7081dff1da9aae8ab3d2237cf2d05deee5fa4d2f881843679c7e786d53
SHA512 abcd72a26153514e24f48e241d4984e6e0f99942450aac084b731a6a61c8277d42d8d7a90e0777ca2193a8368ab0c3a358b38deaf8f68fb740ce20aff0b9ee4f

/data/data/com.um.mplayer/databases/umplayer.db-journal

MD5 96d2b5413bfe1a0a5e729f074dfd8fd3
SHA1 b6db27dd5546910e33fb981ec6a7026d054b97dc
SHA256 92f2985a77d1596bcfca4cd827a2592406c26d1cac4475df1a1089f274241c0d
SHA512 7153d97972b77c8ece03c8114e3bdb37ca275f413751abfb27acbc9bbd31c00b9de91beea84ce9cec50815b977223faf40df7b1e58a535976f5088028b1da368

/data/data/com.um.mplayer/databases/umplayer.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.um.mplayer/databases/umplayer.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.um.mplayer/databases/umplayer.db-wal

MD5 91f18dcab9d74c43eb37b5f56286100c
SHA1 192f302b3442d464a07ae46922a2f576dab4be11
SHA256 3429d7acc02f74eadaac7a11f4c5e3f0048fb2d87774a16eeaedefea1fec4f2b
SHA512 dbe6f4e70e363064613e9377dc0f503aa404d6ba3617594d2954653c5a6c2ef423bccb16d7a3f0c029a2042fe262460f27857edd4d67ec778155a40aa3d0a450

/data/data/com.um.mplayer/cache/3924886416.jar

MD5 9ee0393d536b3928ea62fe60d2ddda9e
SHA1 58fbcc8e066bc65b4ca6767e8d6d11935ef10aff
SHA256 3a160b61a6bc48d4f8d9c956a5fc49f883f60a1a6e1a92f52d3c5773dad81a19
SHA512 4115df7d8cc403f46d5c7eeb3854dbae9659eff92e69834f4b08c13787a9ae215da015e94e148f3292ea03b423fdd2ac4d7731260de2b7541406c7315ee36f77

/data/data/com.um.mplayer/cache/3924886416.jar

MD5 897e581cce20f2a5fce2c70eb0d77b6f
SHA1 74a41afe70db8151015127a05e06695e4e8b35e9
SHA256 4104c86a2ed1a06c2e7d10bdd1f0c3441d148e21105091671f93043a9767f23f
SHA512 d77fe0763f85f910bb7902d74d1768b510e4398f6622bdadf7e5a12ed813cd7be986d2bb6f91ee86fb2239385d4c22e705394649b7b0b2e8e4440e5642b164ba

/data/user/0/com.um.mplayer/cache/3924886416.jar

MD5 da220ebe8757be652ed037dd7ec67616
SHA1 71f38a33d914d9f7fe604ac725a087cdac083051
SHA256 977a39881d013189d26fe2523f6863e9106946d9f3c8dd08c4882cdca55ac494
SHA512 0037675310824b0dfbfadab4fa0b3d73139b0e3711cd6d298e92b846913c9ac286ddad8c906f9cd89da5db5e9e872be37b6002e62cca17197190affa3f758b14