Malware Analysis Report

2025-01-19 05:01

Sample ID 240606-a2wbtsch9y
Target 99a4907f56f6d38289d1ae8a05795cdb_JaffaCakes118
SHA256 2e79bf9a6ef95dc860e5b69baae8a0829864db0ab54dafd050f7314bc68de782
Tags
collection discovery evasion
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

2e79bf9a6ef95dc860e5b69baae8a0829864db0ab54dafd050f7314bc68de782

Threat Level: Shows suspicious behavior

The file 99a4907f56f6d38289d1ae8a05795cdb_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection discovery evasion

Requests cell location

Queries information about active data network

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-06 00:43

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:46

Platform

android-x86-arm-20240603-en

Max time kernel

2s

Max time network

132s

Command Line

com.alipay.android.app

Signatures

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Processes

com.alipay.android.app

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:43

Platform

android-x86-arm-20240603-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:43

Platform

android-x64-20240603-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:46

Platform

android-x86-arm-20240603-en

Max time network

134s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:46

Platform

android-x64-20240603-en

Max time network

161s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.228:443 tcp
GB 216.58.201.106:443 tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:443 www.google.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.179.228:443 www.google.com tcp
GB 216.58.213.14:443 tcp
GB 142.250.187.227:443 tcp
GB 142.250.187.227:443 tcp
US 1.1.1.1:53 g.tenor.com udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.187.194:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
BE 108.177.15.188:5228 tcp
US 1.1.1.1:53 www.youtube.com udp
GB 216.58.212.238:443 www.youtube.com udp
GB 216.58.212.238:443 www.youtube.com tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.179.228:443 www.google.com udp
GB 142.250.179.228:443 www.google.com tcp
GB 142.250.179.228:443 www.google.com tcp
US 1.1.1.1:53 mdh-pa.googleapis.com udp
GB 216.58.213.10:443 mdh-pa.googleapis.com tcp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
BE 142.251.168.84:443 accounts.google.com tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:46

Platform

android-x86-arm-20240603-en

Max time kernel

3s

Max time network

131s

Command Line

com.sg.android.devil

Signatures

N/A

Processes

com.sg.android.devil

getprop ro.product.cpu.abi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp

Files

/data/data/com.sg.android.devil/.cache/classes.dve

MD5 ada4d92ff6fe77da9f9cd2c3808a7b83
SHA1 521e102dc8d5c1ffc782085b05f4666cda56b2fe
SHA256 f6d19af959e1cc3ca0e07a856ef37b3b5ea531e1fcd8a4f87cd94b7693e5b031
SHA512 c76f6c852ab8ffd47a94d871e370841d123a9ea16cd1b64567dac2f80578646091a2b09fbbd277e4849a7d7757f41fac5632a300e271571f44014a9de4944521

/data/data/com.sg.android.devil/files/libmegbpp_03.01.00_00.so

MD5 13fa48967768f659b133f203b1a28dff
SHA1 c78b5e539a5689f6966874ae52a9479f0302f07a
SHA256 e62d881a7cc125766213dffea538e886a3cc95cbe8f04d934403555fa9db915a
SHA512 2fae42045342bae6abdc9b37b979b5963843267a7ea98ede66eeafa782abebcec334378f3c2dd4e9aceb8c5543396287732246db8fb29a6f0e9c2b1710d09dbd

/data/data/com.sg.android.devil/files/d_data_store.dat

MD5 42a539a308a3f34b1991843afc9e49b0
SHA1 29b49d422ae33033a1d734ff602bb83a3e9df92a
SHA256 1c2a7cf32039a3f90f12ddb4e10b44964e9876691171c4a14c9416166ae7846e
SHA512 fe17e663ff947ee38ac84bbcc778efa32aba6a6e371ffacfacfc1c3d1e98ba710743aebbe6f4c7e58ff5ac92ab6fcaff8dcee08d927e365983d74aa0042b3ee9

/data/data/com.sg.android.devil/files/tmp/c_data_store.dat

MD5 9b130e77ca4cb5f61e20629a9b4876d7
SHA1 a630d13499cf0c2d8b8742dfd05fd1abba6c7f75
SHA256 6e04ffced231af6ff9f75aeab5c6ea6c96aa23af22bbc9d34cf70ceeceb217bc
SHA512 2d10bee07c788799d43bd406c8d9b41f2c7f13fd8b96bd2ac85456c4cb0262724a4f5fd7fdb1ce5e2faa108160db014add954e47fbf900786df099876dac2165

/data/data/com.sg.android.devil/files/tmp/AndGame.Sdk.Lib_20150_86098B59D437DE14494674358197AAEA.dat

MD5 86098b59d437de14494674358197aaea
SHA1 815f17554d45f834c613640bcbf99ba4e245f110
SHA256 d7972f0b375427ebb84d3143143959c5d2d5dfcc4a4821fdd2b0a604cd744e7f
SHA512 0c8823b60fc81a4d403e9042ccbb52efe6304b0f1a42afa4674249ee1ec5305ca4f27b20cbaf6f3705cb127fd5cbbf57fa8d7f6c0de852a5ef9032095f8d9319

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:43

Platform

android-x64-arm64-20240603-en

Max time network

8s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-06-06 00:42

Reported

2024-06-06 00:46

Platform

android-x64-arm64-20240603-en

Max time network

134s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

N/A