Malware Analysis Report

2024-07-28 11:25

Sample ID 240613-11vxsasbqd
Target a6cf25ac4db28c9db277212733242efa_JaffaCakes118
SHA256 6f276d6c7e4e2b0e7f7dc09b4158bad2f0a4afada6c220569b11ae840f8437a1
Tags
collection discovery evasion persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

6f276d6c7e4e2b0e7f7dc09b4158bad2f0a4afada6c220569b11ae840f8437a1

Threat Level: Shows suspicious behavior

The file a6cf25ac4db28c9db277212733242efa_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection discovery evasion persistence

Reads the content of photos stored on the user's device.

Requests dangerous framework permissions

Queries information about active data network

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation)

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 22:07

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 22:07

Reported

2024-06-13 22:10

Platform

android-x86-arm-20240611.1-en

Max time kernel

167s

Max time network

148s

Command Line

com.laowo.family

Signatures

Reads the content of photos stored on the user's device.

collection
Description Indicator Process Target
URI accessed for read content://media/external/images/media N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.laowo.family

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 s.jpush.cn udp
CN 124.70.128.38:19000 s.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
CN 1.94.119.240:19000 sis.jpush.io udp
US 1.1.1.1:53 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 113.31.17.106:7000 tcp
US 1.1.1.1:53 im64.jpush.cn udp
CN 119.3.188.193:3000 im64.jpush.cn tcp
CN 124.70.128.38:19000 easytomessage.com udp
CN 1.94.119.240:19000 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
CN 119.3.188.193:3000 im64.jpush.cn tcp
CN 124.70.128.38:19000 easytomessage.com udp
CN 1.94.119.240:19000 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
CN 119.3.188.193:3000 im64.jpush.cn tcp
CN 124.70.128.38:19000 easytomessage.com udp
CN 1.94.119.240:19000 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
CN 119.3.188.193:3000 im64.jpush.cn tcp
CN 124.70.128.38:19000 easytomessage.com udp
CN 1.94.119.240:19000 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
CN 119.3.188.193:3000 im64.jpush.cn tcp

Files

/storage/emulated/0/Android/data/com.laowo.family/cache/uil-images/journal.tmp

MD5 8c92de9ce46d41a22f3b20f77404cc1d
SHA1 8671a6dca00edb72be47363a7071be65cf270373
SHA256 68bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274
SHA512 30f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56

/data/data/com.laowo.family/databases/backupImage.db-journal

MD5 670a2b0fa7e7304addadfb7c6ab8aeb4
SHA1 fc9dcbf8d50db4c03393521c61df22efe9c81fe2
SHA256 798c08390531fb774c65632800e6672fab8b17e113751ce7171275e72ad49894
SHA512 9aba8f10056d8b0d264ff61f8bb807de7e944c1fd37f3e0696a5aef00c4effd12bbc0e43c278ac4e98884ec2bc3a91a49c39a1762c21f3ce22ecdc36d4f4b511

/data/data/com.laowo.family/databases/backupImage.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.laowo.family/databases/backupImage.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.laowo.family/databases/backupImage.db-wal

MD5 2e63d67b2e064c5bb3139ceada3f55f3
SHA1 284e1739a78ffc1a786f67ca395b772341c166d0
SHA256 760cadc31fb65c812f1cfce8cab8346d4f62fa7ec62ac5c30261ae85454412f7
SHA512 579c94ed73b526fa5cc2579b5489bc31fb26484efff29d2742b69ba510b95bfa0343be53f5ff2764a227724e43f89903eb94ed1e7d71b426ae8a1ff96ec15999

/data/data/com.laowo.family/files/jpush_stat_cache.json

MD5 ca2457d575e196eabc32dc478ac86289
SHA1 b14af1290fdd8cf84e405a91c4b40c6c88b2ed2c
SHA256 bf8e14ce444113eac7e97da0ae5665b0b2d42d9ec26944830de6b13eab0dcf8b
SHA512 cdc882c41879fa91352b004b24e4b63bf525538f9071647d4997acddf482f31c238f2feb8d825101fec57814509b0abcba90f1fae163f2c704fc507e862d3e37

/storage/emulated/0/Android/data/com.laowo.family/cache/uil-images/journal

MD5 5948f0480dc356bf94a72b890632139d
SHA1 34bd351ffccbd8be860734123df552d9b3818e62
SHA256 ad4de6fca07983b456f3e81649a4eded081f2f6539e0117e982a10dfef739cca
SHA512 87671a97d8dc9f80c4eec54cf3e0c72ddc78aff38e567a993a567e5bb81e45ec70dcd0e177b2c88ee588250fd057c43999f7d980a2c9ea75bec9c4443cbae930

/storage/emulated/0/Android/data/com.laowo.family/cache/uil-images/783301771.0.tmp

MD5 33e57f6fb86ff1f87b44779bef43e9c4
SHA1 ef758162cea866f4acb7db7411959fc552c34267
SHA256 2434c5a8a07e4be50009d7e18f604cc05cb69675fd0430ede372b5e17f9f6af5
SHA512 258b73dae23331b5f824c9e649bf513353a192d6296711da7a979911aaa3e45dcec831f3b80e0513886040620d8860cfac1f573e4bd59705835a50d60010c13a

/storage/emulated/0/Android/data/com.laowo.family/cache/uil-images/783301772.0.tmp

MD5 0705840af6903c1a94bba20316cd4ccd
SHA1 bd0bd5074cba19e50452d056a9a84bf2ba5b4d2f
SHA256 8a4e2dd22d769107d7d0c8b11c428703a7efacebadf7f89b6a7ed799bdc86413
SHA512 55ea70a7e9e7a2cdf0e74e34a2a5ae9b893760ce2d3a677eb9a21ba6209322b8ab54f1547415b72d2b28d5a90bc962fc9fd8cd44665b65a0869c6249df53428d

/storage/emulated/0/Android/data/com.laowo.family/cache/uil-images/783301770.0.tmp

MD5 2ff1f258a205361d9540e4b2d68b7f51
SHA1 3caa9820dba00e4362f048686c53184772b46b1d
SHA256 e46540cb5ac9b4599d48faba83f372b5bfec846901863063dd30442cecef593c
SHA512 c1841afcde235189735489826f6e0838de7622f308c0b2ca1b67a2dd764f6d2652cffdc93346aac8012ed0765a0bab1e2164697f312d42a9e31d44d2b2e73485