Malware Analysis Report

2025-01-19 07:49

Sample ID 240611-vtnbgavbke
Target 9ef2609f84ca43c21627ab46b84d885c_JaffaCakes118
SHA256 70af01ad0f6a053684d323a6bf2b5a2a54f1bb23916a17e6c5bc6e43386c8540
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

70af01ad0f6a053684d323a6bf2b5a2a54f1bb23916a17e6c5bc6e43386c8540

Threat Level: Shows suspicious behavior

The file 9ef2609f84ca43c21627ab46b84d885c_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 17:17

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 17:17

Reported

2024-06-11 17:20

Platform

android-x86-arm-20240611-en

Max time kernel

2s

Max time network

130s

Command Line

com.touchclound.kdzmanager

Signatures

N/A

Processes

com.touchclound.kdzmanager

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

/data/data/com.touchclound.kdzmanager/.jiagu/libjiagu.so

MD5 a516cbf11fecc180e54b5a74cc225502
SHA1 ca825840d2742777d5ec6e4340e0352e2d4825d4
SHA256 97c8ff10c826a8aab11cde01e105501f024b604bab6d96441aaaaef8f2ce8a0e
SHA512 2d8479a55fb5089d02bcec2b704fd8208280015497b7a8c2230af35f7dfb3e0363b82dcd56654b230c303cee56de84485c27003fc24cfa3cf8b1c8b818404210