Malware Analysis Report

2024-07-28 11:24

Sample ID 240613-12mb2ascjf
Target a6d053c16ef095df436f6874aeebaeef_JaffaCakes118
SHA256 deb742154c17fa70c3ed8b199109a57c39e6ffe0db78c0f1d0ce82ba1a8f4fef
Tags
collection discovery evasion impact persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

deb742154c17fa70c3ed8b199109a57c39e6ffe0db78c0f1d0ce82ba1a8f4fef

Threat Level: Likely malicious

The file a6d053c16ef095df436f6874aeebaeef_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

collection discovery evasion impact persistence

Checks if the Android device is rooted.

Queries information about running processes on the device

Requests cell location

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Requests dangerous framework permissions

Queries information about active data network

Listens for changes in the sensor environment (might be used to detect emulation)

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 22:08

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 22:08

Reported

2024-06-13 22:12

Platform

android-x86-arm-20240611.1-en

Max time kernel

173s

Max time network

181s

Command Line

com.zyl002.d202

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/app/Superuser.apk N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.zyl002.d202

com.zyl002.d202:pushcore

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.202:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 openinstall.io udp
US 1.1.1.1:53 s.jpush.cn udp
CN 1.94.119.240:19000 s.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
US 1.1.1.1:53 easytomessage.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
US 1.1.1.1:53 im64.jpush.cn udp
CN 1.94.119.240:19000 easytomessage.com udp
US 1.1.1.1:53 im64.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
CN 139.159.137.254:19000 sis.jpush.io udp
CN 123.60.89.60:19000 sis.jpush.io udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
CN 119.3.188.193:7005 im64.jpush.cn tcp
CN 119.3.188.193:7004 im64.jpush.cn tcp
CN 119.3.188.193:7000 im64.jpush.cn tcp
CN 119.3.188.193:7003 im64.jpush.cn tcp
CN 119.3.188.193:7009 im64.jpush.cn tcp
CN 119.3.188.193:7006 im64.jpush.cn tcp
CN 119.3.188.193:7002 im64.jpush.cn tcp
CN 119.3.188.193:7007 im64.jpush.cn tcp
CN 119.3.188.193:7008 im64.jpush.cn tcp
CN 1.94.119.240:19000 sis.jpush.io udp
US 1.1.1.1:53 sis.jpush.io udp
CN 1.92.70.140:19000 sis.jpush.io udp
CN 123.60.89.60:19000 sis.jpush.io udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
CN 119.3.188.193:7003 im64.jpush.cn tcp
CN 119.3.188.193:7006 im64.jpush.cn tcp
CN 119.3.188.193:7000 im64.jpush.cn tcp
CN 119.3.188.193:7005 im64.jpush.cn tcp
CN 119.3.188.193:7004 im64.jpush.cn tcp
CN 119.3.188.193:7002 im64.jpush.cn tcp
CN 119.3.188.193:7007 im64.jpush.cn tcp
CN 119.3.188.193:7008 im64.jpush.cn tcp
CN 119.3.188.193:7009 im64.jpush.cn tcp

Files

/data/data/com.zyl002.d202/lib-main/dso_state

MD5 e29b43df675fae4fdb04469337650d81
SHA1 4aa8738fe76d0d3ff30977b9b5efdeb0cb6e6759
SHA256 e27ae5ca3bad9bde82b89a2a2c4a5502b45fbacb610b7b16cb8f11e9ecb2dd0f
SHA512 17282cc4c96f1e7fdeec33dcbc696d2706f03076be15b4efc3b8abe868d0ec664d640d26fade0ed015de57f8cb466c8f4c01ee7c5854e11521f45a19aa892e29

/data/data/com.zyl002.d202/lib-main/dso_deps

MD5 529386a1d6cbedf8398fe9825589488a
SHA1 a020fdeefe096c1e873f7262e40829f6816feca7
SHA256 482ce87fe9b478d58d0e7d5ec7bb2ef11e94737299f253bd77157971e5f9a6f5
SHA512 0fe296c46109b07c8d59e773687d74d76af89eba7cd3c795d30169558c04fa74a0a5b5b7abcbc53db5990bdf1b345e722b8e7f14d9d687565f8add06f234e6a1

/data/data/com.zyl002.d202/lib-main/dso_manifest

MD5 2126501b3ae83696191d5de352e2ccfe
SHA1 ce3f336f98e7897ecff99fbb960c9abf24c0e8d4
SHA256 0f933acdeb76a40afbc31af8cdcac6c274f8afd54cfa484f22591a9a51051362
SHA512 6c4631569c21a2ce90c3612a79382a3e051a4c7924eaad03b2565e5e0477621efbe92c6a7e7a7199408b1587e6291c3f553fc38f168ac3bb244e855b42dcbecb

/data/data/com.zyl002.d202/lib-main/dso_state

MD5 55a54008ad1ba589aa210d2629c1df41
SHA1 bf8b4530d8d246dd74ac53a13471bba17941dff7
SHA256 4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a
SHA512 7b54b66836c1fbdd13d2441d9e1434dc62ca677fb68f5fe66a464baadecdbd00576f8d6b5ac3bcc80844b7d50b1cc6603444bbe7cfcf8fc0aa1ee3c636d9e339

/data/data/com.zyl002.d202/app_crashrecord/1004

MD5 c9691cfa94f913c800f1fe534a38c42e
SHA1 dded2f60f9f5a934fe7ce9e7e921befbd3aa6704
SHA256 4365cff4853079439399242efae0e6bb665587ac8a96f68e3b300a9f59e8c0d8
SHA512 8cff4d79ce28dca0b70be97147f9735a45aa1b5444beaa75f497aa9f9d41de96054eca9d4b1f87859e4c6ad210fed6f22a72d1a38b7ea8f6e1db129844b72972

/data/data/com.zyl002.d202/databases/bugly_db_-journal

MD5 a668a4f9beb458e4e904ec9a3edb9740
SHA1 ec1790500a571adb1912948498e1e3dd07828015
SHA256 98ca2501f541a7c60aa3c2c2f06b3162785fc085add5d70317b5d2c8bbf3afc2
SHA512 cb40240bcc97fe60896314dfb02d7f253b4ada7ccb7378765fb22d008911c92f93e8d18d3f7cad92000acc9cde59c4bef05ff6693b35f92c976661c6e5f04dbf

/data/data/com.zyl002.d202/app_crashrecord/1004

MD5 a8e4ce4d5ccc39fcb1fd9e6188a35d37
SHA1 7c79e4a65f4bc30206d1208601cdad1cb8cf7465
SHA256 82458b319c1e1072e218ea3a7b1111d44415a354fd179ae0cd92330e7841c356
SHA512 94f98bcea6215242a4a8d3fd9758680955a603f46d001d047dc24021b5106e1a762aab337f9c79c063d1836d30d283497fa0f43c88737d176bb4b1b90767db45

/data/data/com.zyl002.d202/databases/bugly_db_

MD5 1c4274aa7a9a5cac8c6d1df71e4588c6
SHA1 abaecd685e01cc68801292e3dc7085654a22feba
SHA256 3f6cd5f480ae69859b7841450f3d032c528ba385ebf9f371b9c8fdc6eb4231be
SHA512 1adb95935798607bd36cedcd183924d3068f50097d017b278da7caee7771532b61ec3606f6189b6dec8426eb038fe40be75079ce35894b1a8e0d1d815261150c

/data/data/com.zyl002.d202/databases/bugly_db_-wal

MD5 02e76f3c40c008de7c56075bf4b181ad
SHA1 824acf33f499f00d37249a2396e1bc6ba8f01102
SHA256 d06efe14b2d6a252ea8a2f71243c73abe3135a862f7169f05e1091e512469c45
SHA512 4c1491612e2dfa7c3f6d0af1d8d04d522f0a0b6af7eb229af1ca53e9f6e349a8c3ad61c9ed809b2b7c681f4c97f423bc8b0acbb1c7cf2bb1a6bb9b9716a690b4

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 22:08

Reported

2024-06-13 22:12

Platform

android-x64-20240611.1-en

Max time network

133s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp
GB 216.58.212.238:443 tcp
GB 142.250.200.2:443 tcp

Files

N/A