Analysis Overview
SHA256
a4da3ad678ef777d8cbf0731e17e3a4722ded52bcdbf4115112cde7aa7ddbd26
Threat Level: Shows suspicious behavior
The file 9eef496dcb8f4fbbcc80a99f293806e0_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Requests dangerous framework permissions
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-11 17:12
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 17:12
Reported
2024-06-11 17:18
Platform
android-x86-arm-20240611-en
Max time kernel
3s
Max time network
138s
Command Line
Signatures
Processes
com.aidingmao.merchant
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.212.202:443 | tcp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.180.10:443 | semanticlocation-pa.googleapis.com | tcp |
| GB | 142.250.180.10:443 | semanticlocation-pa.googleapis.com | tcp |
| GB | 216.58.212.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
Files
/data/data/com.aidingmao.merchant/files/libjiagu.so
| MD5 | faa973621086d6fb8d1fe86a460db40b |
| SHA1 | ae09cfa2351e7ca98d3acc9d9bf7d0bb17680537 |
| SHA256 | 6ee081753f582d98d552f6fa41c832fd668fb7634f5719c2bcfeea8d856d58f8 |
| SHA512 | 9a4728f8826063f927ebf968ceef932eefb3f4920ef92180447b4fa0159fa1657ebd21da4e795e950c9c2d19f7b83ccc5aee0551e288f22cf2ec39d3740f4622 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 17:12
Reported
2024-06-11 17:18
Platform
android-x64-arm64-20240611-en
Max time kernel
2s
Max time network
160s
Command Line
Signatures
Processes
com.aidingmao.merchant
Network
| Country | Destination | Domain | Proto |
| GB | 216.58.212.238:443 | tcp | |
| GB | 216.58.212.238:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.200.40:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.200.36:443 | tcp | |
| GB | 142.250.200.36:443 | tcp | |
| GB | 142.250.180.3:443 | tcp |
Files
/data/user/0/com.aidingmao.merchant/files/libjiagu.so
| MD5 | faa973621086d6fb8d1fe86a460db40b |
| SHA1 | ae09cfa2351e7ca98d3acc9d9bf7d0bb17680537 |
| SHA256 | 6ee081753f582d98d552f6fa41c832fd668fb7634f5719c2bcfeea8d856d58f8 |
| SHA512 | 9a4728f8826063f927ebf968ceef932eefb3f4920ef92180447b4fa0159fa1657ebd21da4e795e950c9c2d19f7b83ccc5aee0551e288f22cf2ec39d3740f4622 |
/data/user/0/com.aidingmao.merchant/files/libjiagu_64.so
| MD5 | 1bd1afa91871face2b2918065c19c2af |
| SHA1 | e4a77d973844bb027f849af14f6f19e49bd81d53 |
| SHA256 | 352523dbfa4966cda4e390b315676f717d3ed09274a9d7fe5459917893f3d1df |
| SHA512 | b0ed050172f043e94174626ac55ba928b8ff585a3102d25c7bba5cb69e323725d16914e7a43e028c855c574898d2d5716837a399510ae19ffd2244fe28aeda3c |