Malware Analysis Report

2024-09-09 17:14

Sample ID 240613-2zvfasxhlk
Target a701ea93eff8d9e9d2e53ec6ba0ad700_JaffaCakes118
SHA256 bec067e405136d04b1bf98dda6a5550cbd79db481a9d4be5b4b13ac18f52ea48
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

bec067e405136d04b1bf98dda6a5550cbd79db481a9d4be5b4b13ac18f52ea48

Threat Level: Shows suspicious behavior

The file a701ea93eff8d9e9d2e53ec6ba0ad700_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:01

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:01

Reported

2024-06-13 23:04

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

130s

Command Line

com.zgnckzn.android.gzsx

Signatures

N/A

Processes

com.zgnckzn.android.gzsx

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp

Files

/data/data/com.zgnckzn.android.gzsx/.jiagu/libjiagu.so

MD5 350725f563f224eafc5105c95e122ae0
SHA1 39bfbebc17cc2e68de75858f3e6a7e591de5c587
SHA256 2f23bbae04cb5c6dea52e9c02762a5872c3999796a2fd127a7b77374cc37e936
SHA512 592cf1b26694b1da203e27496ffb5da498c025b4c9bc174bc6c2dd17aa65bd63bc2ed76952237cfad4c60c527bb285631d1988fcb2a0aa179c7bf2c5dd68f852