Malware Analysis Report

2025-01-19 07:51

Sample ID 240609-dfrcjacf4t
Target 杰猫_2.1.6_APKPure.apk
SHA256 52a4e8239ca476f52dd4c77e886da3653307d4e98aab4f20d10a61b851a3f239
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

52a4e8239ca476f52dd4c77e886da3653307d4e98aab4f20d10a61b851a3f239

Threat Level: Shows suspicious behavior

The file 杰猫_2.1.6_APKPure.apk was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-09 02:59

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-09 02:57

Reported

2024-06-09 03:05

Platform

android-x64-arm64-20240603-en

Max time kernel

3s

Max time network

132s

Command Line

com.stargo.jmall

Signatures

N/A

Processes

com.stargo.jmall

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 216.58.212.196:443 tcp
GB 216.58.212.196:443 tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-09 02:57

Reported

2024-06-09 03:05

Platform

android-33-x64-arm64-20240603-en

Max time kernel

4s

Max time network

152s

Command Line

com.stargo.jmall

Signatures

N/A

Processes

com.stargo.jmall

Network

Country Destination Domain Proto
GB 216.58.212.196:443 udp
GB 216.58.212.196:443 udp
N/A 224.0.0.251:5353 udp
GB 216.58.204.67:443 tcp
GB 216.58.212.196:443 udp
GB 142.250.180.4:443 udp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
US 162.159.61.3:443 tcp
US 162.159.61.3:443 tcp
GB 216.58.212.227:443 tcp
US 162.159.61.3:443 udp
GB 216.58.212.227:443 udp
US 1.1.1.1:53 remoteprovisioning.googleapis.com udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-09 02:57

Reported

2024-06-09 03:05

Platform

android-x86-arm-20240603-en

Max time kernel

3s

Max time network

145s

Command Line

com.stargo.jmall

Signatures

N/A

Processes

com.stargo.jmall

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.187.206:443 tcp
GB 216.58.213.2:443 tcp
US 1.1.1.1:53 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:443 www.google.com tcp
US 1.1.1.1:53 update.googleapis.com udp
GB 216.58.212.227:443 update.googleapis.com tcp

Files

N/A