Malware Analysis Report

2025-01-19 07:49

Sample ID 240611-vwq55svejp
Target 9ef574db86c5f2a8cd9b86c823446bb5_JaffaCakes118
SHA256 346012bdb24294e0628bf7cec3d50e7f15845f87497688ded8bdf9c3246f32cb
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

346012bdb24294e0628bf7cec3d50e7f15845f87497688ded8bdf9c3246f32cb

Threat Level: Shows suspicious behavior

The file 9ef574db86c5f2a8cd9b86c823446bb5_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 17:20

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 17:20

Reported

2024-06-11 17:23

Platform

android-x86-arm-20240611-en

Max time kernel

3s

Max time network

130s

Command Line

com.yhlt.qdfwpt

Signatures

N/A

Processes

com.yhlt.qdfwpt

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp

Files

/data/data/com.yhlt.qdfwpt/.jiagu/libjiagu.so

MD5 7274dfc1e8d08075495ca657dadff181
SHA1 e3cb1f637468445de6132385e5d1043d2b4850d9
SHA256 07d59919a5936e001ab4d9b3ede13e543f8802d6d3095480c29851efdecfe723
SHA512 a0a04e0fba84a1eb30b812fba12a3f21c7269a3f1b673bb2f89979d19fceff5e7f92fcb6d564f93069c5ed6169778126616012e528e42af0bd4345b8358dca9e