Malware Analysis Report

2025-01-19 07:47

Sample ID 240611-za7yzs1ana
Target 9b6a6eefa218ea64d3a067180e21f623_JaffaCakes118
SHA256 9f3ce227b9cec64cb3424e219956cb34443e2e2646e26b650d3c3a3c4f5a2aea
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

9f3ce227b9cec64cb3424e219956cb34443e2e2646e26b650d3c3a3c4f5a2aea

Threat Level: Shows suspicious behavior

The file 9b6a6eefa218ea64d3a067180e21f623_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 20:32

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 20:31

Reported

2024-06-11 20:35

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

136s

Command Line

com.kg.lottery.ybyl

Signatures

N/A

Processes

com.kg.lottery.ybyl

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

/data/data/com.kg.lottery.ybyl/.jiagu/libjiagu.so

MD5 f380717bd1e3916c7b697fab8d46c5d8
SHA1 04f51f0d16097214e38be517d93be44cb0603a88
SHA256 8455632be7bacb221468c4daab2f9b5ee33739f08b22244ff81a36a02bec36cc
SHA512 b78fe11f77d2c0ec5b36850e8cc3b955661b31641405233c8842b91205e44dc16a30d7fc1ef18dde1b066c1b98959ae9c18be5472413d2b398b7ab6a6b52c07e