Malware Analysis Report

2024-09-09 17:10

Sample ID 240613-2ag4nssfke
Target a6dc358dc148ff0a01e53955017fc340_JaffaCakes118
SHA256 f022af0f2eccd0e046c584b15caa8e2986fcd04de3e591f793b3faa09eb8a24c
Tags
banker discovery impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f022af0f2eccd0e046c584b15caa8e2986fcd04de3e591f793b3faa09eb8a24c

Threat Level: Shows suspicious behavior

The file a6dc358dc148ff0a01e53955017fc340_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker discovery impact persistence

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries information about running processes on the device

Requests dangerous framework permissions

Queries information about active data network

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 22:22

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 22:22

Reported

2024-06-13 22:22

Platform

android-x86-arm-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 22:22

Reported

2024-06-13 22:22

Platform

android-x64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-13 22:22

Reported

2024-06-13 22:22

Platform

android-x64-arm64-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 22:22

Reported

2024-06-13 22:25

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

177s

Command Line

com.qihoo.gameunion

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.qihoo.gameunion

com.qihoo.gameunion:remote

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 tr.p.360.cn udp
US 1.1.1.1:53 next.gamebox.360.cn udp
CN 101.198.3.20:80 next.gamebox.360.cn tcp
CN 101.198.3.20:80 next.gamebox.360.cn tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
US 1.1.1.1:53 mdws.openapi.360.cn udp
US 104.192.110.235:80 mdws.openapi.360.cn tcp
CN 180.163.231.139:443 tcp
US 1.1.1.1:53 openbox.mobilem.360.cn udp
US 1.1.1.1:53 openbox.mobilem.360.cn udp
CN 180.163.251.81:80 openbox.mobilem.360.cn tcp
GB 216.58.212.202:443 tcp
US 1.1.1.1:53 openboxcdn.mobilem.360.cn udp
GB 138.113.101.20:80 openboxcdn.mobilem.360.cn tcp
CN 101.198.3.20:80 next.gamebox.360.cn tcp
CN 180.163.231.139:443 tcp
CN 180.163.231.139:443 tcp

Files

/data/data/com.qihoo.gameunion/databases/gameunion.db-journal

MD5 15b2ddf0d8f82686ee5790340b4610c6
SHA1 350b8f8ca02b2e4c0a28f8b7762dd5b5e2b11847
SHA256 a68a12d0bdb6a3c3e1174bf7c1fbca6898f291d484d93fc59b6aec831079dc19
SHA512 d809b513f58abdfd9cc9b585c6132901d09a66dc680e70b90fdb1c443ea933442adb6d998f78de4f728bcd7337aeb3b48aa61ef4ccbb8faf54df78875e424122

/data/data/com.qihoo.gameunion/databases/gameunion.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.qihoo.gameunion/databases/gameunion.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.qihoo.gameunion/databases/gameunion.db-wal

MD5 73456204126449763641a8f84cf73293
SHA1 ef7f02863144428757345b810cf726107e17baec
SHA256 b8630a5a3b2f77e587b10e2ccc61f7961505123059e396e5c6b107a4be026a08
SHA512 809c8fecd40d2b26f1f74bbad3a5d1d8a78fe4b7ffe0d5d9ffcf849817c122ef27bde59d0119b85adbd87dae9b47d7435f53b11b936ea8fcf1aeac251b633367

/storage/emulated/0/Android/data/com.qihoo.gameunion/cache/uil-images/journal.tmp

MD5 dd9a1d4b314f3b06a529b341e9d7a690
SHA1 dc4ccece640cd446ca82d44fd42a015209c8bccf
SHA256 94053344f103f19e2124ee046ce44906ba15c3afe319ba68b735d274bbd7f77d
SHA512 b4cc5baa12e4966229f62c0dbed2820e7b244d2f31db84c06c99dbf226ec63cd3e35ec13f689daec541024bffe1030a984a6e3763805950e1efdde218a8c4681

/data/data/com.qihoo.gameunion/files/guardian

MD5 fe557d5254a63040b847683c4da99118
SHA1 3520e44f9cec09eaa91379c3123f474d31578404
SHA256 973d42c20353b0404729d31521331f0615a6abe0caa1b043f5669ee919bbb737
SHA512 cddecb26397d2db104842de3ee2f41a885bf19f0d6ba07d87fb1b3a2a3fcf87c3c74fb4f0bd0ee96aef588fcc9f3a545e550691f8aa5d087e2dc463b57c58625

/storage/emulated/0/gameunion/.cache/icon/com.qihoo.gameunion.png

MD5 7a311d1d30b2c0c2237f45fe7bc9544a
SHA1 9976fdb2510906aa801a55a98cc7a346b8f5e9a9
SHA256 aafe1bfe4be477996da1c263e16d0096eff87529eaf5cf6176652d6744820751
SHA512 34039c68be08476fd2d4d72741367f89255e9c98129ef49809d35ead9d4daf7941f939cd231a5484e8132f3dbbb468ee11d62e4930043a5f4442f994931eb1d5

/data/data/com.qihoo.gameunion/files/helpershowblacklist.dat

MD5 e85ad2ec02ceecce015371d15e46a3b1
SHA1 387475c06d4626ca0d38d28bd3519b7bfaa12e84
SHA256 4235ec104b5ac1a9e5d4c43e73dc6458963f08e2d78fe9ad0c03820ec6236c14
SHA512 3ac4cdf122fd3663d4053df719358092635f8cb7ef2175e3ea42c74c8faafecb4cb0064f8b38be544cea068ebe7dbf386cfc97a5cb2ad570243bd386b6833f05

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 22:22

Reported

2024-06-13 22:22

Platform

android-33-x64-arm64-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 172.217.169.36:443 udp
GB 172.217.169.36:443 tcp
BE 173.194.76.188:5228 tcp
GB 172.217.16.228:443 tcp
GB 216.58.201.106:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A