Malware Analysis Report

2024-07-28 12:08

Sample ID 240612-wrcmmavarc
Target a1aa6e1b5534b1853baf1b3f2504ebad_JaffaCakes118
SHA256 e708b33e7a1222778716c0d21cf8aed1a4fc90597f7c1188c3eac3d3b5bd6274
Tags
banker collection credential_access discovery evasion persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e708b33e7a1222778716c0d21cf8aed1a4fc90597f7c1188c3eac3d3b5bd6274

Threat Level: Shows suspicious behavior

The file a1aa6e1b5534b1853baf1b3f2504ebad_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection credential_access discovery evasion persistence

Queries information about running processes on the device

Makes use of the framework's Accessibility service

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Requests dangerous framework permissions

Queries information about active data network

Queries the mobile country code (MCC)

Declares services with permission to bind to the system

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 18:08

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 18:08

Reported

2024-06-12 18:12

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

138s

Command Line

com.atools.box

Signatures

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.atools.box

com.atools.box:remote

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 graph.facebook.com udp
GB 163.70.147.22:443 graph.facebook.com tcp
US 1.1.1.1:53 user.oppoos.com udp
US 67.225.218.22:80 user.oppoos.com tcp
US 1.1.1.1:53 data.flurry.com udp
US 74.6.138.66:443 data.flurry.com tcp
US 1.1.1.1:53 server.oppoos.com udp
US 1.1.1.1:53 switch.joyfulbit.com udp
US 67.225.218.22:80 server.oppoos.com tcp
US 3.130.204.160:80 switch.joyfulbit.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 67.225.218.22:80 server.oppoos.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 142.250.179.238:443 www.youtube.com tcp
US 1.1.1.1:53 cms.oppoos.com udp
US 1.1.1.1:53 m.youtube.com udp
US 67.225.218.22:80 cms.oppoos.com tcp
US 67.225.218.22:80 cms.oppoos.com tcp
GB 142.250.178.14:443 m.youtube.com tcp
US 67.225.218.22:80 cms.oppoos.com tcp
US 1.1.1.1:53 t.appsflyer.com udp
GB 216.137.44.128:443 t.appsflyer.com tcp
US 1.1.1.1:53 accounts.google.com udp
BE 66.102.1.84:443 accounts.google.com tcp
US 1.1.1.1:53 gstatic.com udp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 172.217.16.226:443 googleads.g.doubleclick.net tcp
US 1.1.1.1:53 jnn-pa.googleapis.com udp
GB 142.250.200.42:443 jnn-pa.googleapis.com tcp
US 1.1.1.1:53 static.doubleclick.net udp
GB 142.250.200.38:443 static.doubleclick.net tcp
US 1.1.1.1:53 play.google.com udp
GB 142.250.178.14:443 play.google.com tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.212.196:443 www.google.com tcp
GB 216.58.204.78:443 www.youtube.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 client.dl.oppoos.com udp
US 67.225.218.22:80 client.dl.oppoos.com tcp

Files

/data/data/com.atools.box/databases/download.db-journal

MD5 6905657d8a866a843d66f8e13b58d3cf
SHA1 a3884f5db6df96cf03a83b6e85b8e503f7e09df9
SHA256 349547189ec4831321191db00525aa32c46fd99b7669b89c15d0994599d908f7
SHA512 bb14fa6b53f26885423c0453120ed998b1276f71f6ff07b4be5d96184663046589734a0f0ee3822f3145e94d06e2b7294c14446c2b4173d141c772d45196f3a6

/data/data/com.atools.box/databases/download.db

MD5 206c42e9c0b55f5cb5d52bbfd4b3c23e
SHA1 862736ee87df11f733e6f2a0fb356310a80397d6
SHA256 92a05f5f89d643750800bc87dd79fae3e58211b15075b3c6750e053678ff72e1
SHA512 53114cdc09cf77d9d2750814ad664099aad5de8f83b483d64dedbd16f674e6a0839c1f279a635f397995315463c3fd33595751233c3eee9f8c8e4cec1d62f2a7

/data/data/com.atools.box/databases/download.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.atools.box/databases/download.db-wal

MD5 3c8869054d930bab916f578eb824148a
SHA1 535af6d70472bf4e05f3784b6a4355a63b924e99
SHA256 0ededdc9cbeb7b71af4d03ef6cf95ce20f8bc845a24f011315fb930272965b6f
SHA512 adef4e3e805d556c224d3fe5c0b45ee989e76fa65e63bf4e153ac5039006c1845a9d177f7f5e29ceea9bb0a77ddacc2087fef59e5102f76acc609ed5adc4a541

/data/data/com.atools.box/files/.yflurrydatasenderblock.dfb39a13-a3f8-4f2c-9054-d9e1a0ca75cd

MD5 387b44f6bd0132fcccccd64e16009f0a
SHA1 8255b9b344302e39082b6879eecf9f5b80c31605
SHA256 2cac3436eee5b897b736f830e521037b81afe0434440f0f7ebac18f159d3a0c4
SHA512 2b973987c073b0d7a5cddb85a0a38cf92335522d766bacc72e7700f18d3148bfb0e404aedc3497bde503414e16c82fb951e4c1c2f2d43689c25fef945f51e2d4

/data/data/com.atools.box/files/.YFlurrySenderIndex.info.AnalyticsData_7JN79D8D7H898RY5Z3XV_211

MD5 6e11c870aea790b3cc9f9219b3d7fd64
SHA1 6d17515f751b2cc1f86aea6c5b457e8f9a900131
SHA256 4444b4b4c51092f63639da44a817a963b08e66c80e95b39db4ca9c192f7df5bf
SHA512 6edebbac5813fe595704f46ed5ac505c032a98830c418b8aff8e6336d70438158a4dafa7983ba948893d72b7537cb01d5ca3578c48a003ce10a40304a50dac67

/data/data/com.atools.box/files/.YFlurrySenderIndex.info.AnalyticsMain

MD5 ca7f2bd1af24408c9036d88b46f6990f
SHA1 049d3277ba1dd4884510dd1527627fc0787ae960
SHA256 44c144b6e3aca866accd0d8865a7fa5f319621830bdba79995d26396f145fe16
SHA512 24b8473df509e16adfd1f80e29c2b37ca5ec5d70dd7c88254e4c8bbece0c64e9fbcf00b1b8f788c25df057e86fbcb8a6a3d4fb6250363409790c4b5e968c9f8a

/data/data/com.atools.box/databases/startapp.db-journal

MD5 2c152f717b6ea9b10153dbea7cb26e69
SHA1 13e61da6e0559c8797c9ff356420bb11dae722b2
SHA256 c08db5307f313868a187215d3498b07a425798de202fdce4220615c784f996d3
SHA512 2c605868553be9c388d06b61c556a7df2ab71348aee887b99db8fe8c152cf60b96265453e3412acc91f3e2709583c2c5f32c17a8f8c8580c4addeb3ed93102f3

/data/data/com.atools.box/databases/startapp.db

MD5 5b975635f69975d1904d8d44d85086ab
SHA1 d5ee4b1f9d29be432c957f5cd337b426bba9c2a3
SHA256 6238a8e27fb373ed57b096c5edea60fe191f133cdfa8f00a42937992fc73343f
SHA512 01a4b193bf1a64c2388f5fb396b441ab96e81cbec5d1eec1e6c90164675287cc57c85b57d77732083355400047358e5f2bc673017714e6a8788698b4c0bbb693

/data/data/com.atools.box/databases/startapp.db-wal

MD5 254fa22e535436216ec72672f8063c09
SHA1 50e763689e0dbd6a41ed589bdf72fbfd3acf5a63
SHA256 03fcef66bbfebe9fa1e6bd109630700dbf3e9c211d58a62f8e9a432eceea88e7
SHA512 7d62af795bbdf0ae112aec3ab66acdfd06717b5c5876f209702e61842b50de6e2eab02e7610d5fe541ac790bd9831fb285626f153e4f4bce42415dc3a1255f38

/data/data/com.atools.box/files/.yflurryreport.76d699a537a86857

MD5 058f8700d55fdab1d3e4d6ecb0bab639
SHA1 d8666bab0d2647afe7347f12291c083c18c34cee
SHA256 9abbcdc6efc986cce41314d1791628868074d56bfc668497693d23543e2aba42
SHA512 b6c7d12b4d1b7263865fd33bc7fc9126f6cbc2d970bc97c3978380d6d1790f7272c203e697590db720e394faf29af008cb2b2aa3123f27ca2ab084e6660d4111