Analysis Overview
SHA256
a9d8acf742dd846cfa6b935192d08ca44e2d3b4a2507a59211bbe6c67ec24be3
Threat Level: Likely malicious
The file a730009ce5312a22decbf7ef89abca61_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Checks if the Android device is rooted.
Reads the content of the call log.
Queries information about running processes on the device
Reads the contacts stored on the device.
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries the phone number (MSISDN for GSM devices)
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
Queries the mobile country code (MCC)
Requests dangerous framework permissions
Queries information about the current Wi-Fi connection
Queries information about active data network
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks memory information
Checks CPU information
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 23:52
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. | android.permission.PROCESS_OUTGOING_CALLS | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to write the user's contacts data. | android.permission.WRITE_CONTACTS | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 23:52
Reported
2024-06-13 23:55
Platform
android-x86-arm-20240611.1-en
Max time kernel
3s
Max time network
149s
Command Line
Signatures
Processes
com.alipay.android.app
Network
| Country | Destination | Domain | Proto |
| GB | 172.217.169.74:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
| GB | 172.217.169.74:443 | tcp | |
| GB | 172.217.169.74:443 | tcp |
Files
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-13 23:52
Reported
2024-06-13 23:55
Platform
android-x64-20240611.1-en
Max time kernel
3s
Max time network
131s
Command Line
Signatures
Processes
com.alipay.android.app
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.201.104:443 | ssl.google-analytics.com | tcp |
| GB | 172.217.16.234:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| GB | 172.217.169.46:443 | tcp | |
| GB | 172.217.16.226:443 | tcp | |
| GB | 142.250.178.14:443 | tcp | |
| GB | 142.250.178.4:443 | tcp | |
| GB | 142.250.178.4:443 | tcp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-13 23:52
Reported
2024-06-13 23:55
Platform
android-x64-arm64-20240611.1-en
Max time kernel
4s
Max time network
132s
Command Line
Signatures
Processes
com.alipay.android.app
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.180.8:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.187.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 23:52
Reported
2024-06-13 23:55
Platform
android-x86-arm-20240611.1-en
Max time kernel
164s
Max time network
137s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /system/bin/su | N/A | N/A |
| N/A | /system/xbin/su | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about running processes on the device
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
Queries the phone number (MSISDN for GSM devices)
Reads the contacts stored on the device.
| Description | Indicator | Process | Target |
| URI accessed for read | content://com.android.contacts/contacts | N/A | N/A |
Reads the content of the call log.
| Description | Indicator | Process | Target |
| URI accessed for read | content://call_log/calls | N/A | N/A |
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
| Description | Indicator | Process | Target |
| N/A | alog.umeng.com | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
cn.pyt365.ipcall
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | voip.pyt365.net | udp |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| GB | 216.58.212.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/storage/emulated/0/pytcall-data-user-guid
| MD5 | 9faac5092b78514b5cc3ca7422a41ce3 |
| SHA1 | fba83f8b165e2e21023d5f82e3e2b8cac31e731e |
| SHA256 | 0d6bd637ccbe1f9f24dee69cfe8998636a6737bfd46b1af4b25815f13d2e29ec |
| SHA512 | ce8202b0ce583fc0915c1b2e43880ecfcb6f8b652940b5d2ebdad9924e4b35c38b88632912a32bd0fcfe656ae75f6e49e9b284b65e3d91eb451e34252ac83a2b |
/data/data/cn.pyt365.ipcall/databases/call_log_db-journal
| MD5 | 3c0faa5fe919fb8aa3045151528fcfd4 |
| SHA1 | 26606a21f06da895076b085226cc2d0d8dbc1c79 |
| SHA256 | 86161fecc103a75e18c79a2492cd824b80b751544f5c3d41243320faba52944c |
| SHA512 | a36625a48a700e345b032fdea730d8aa6eb347211235a2cd934f187eb03e19db69737499b843cc41a562ffa5f02d91eb95d5bbf1349d23ec64dad1dde4daeb68 |
/data/data/cn.pyt365.ipcall/databases/call_log_db
| MD5 | f2b4b0190b9f384ca885f0c8c9b14700 |
| SHA1 | 934ff2646757b5b6e7f20f6a0aa76c7f995d9361 |
| SHA256 | 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514 |
| SHA512 | ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1 |
/data/data/cn.pyt365.ipcall/databases/call_log_db-shm
| MD5 | bb7df04e1b0a2570657527a7e108ae23 |
| SHA1 | 5188431849b4613152fd7bdba6a3ff0a4fd6424b |
| SHA256 | c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479 |
| SHA512 | 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012 |
/data/data/cn.pyt365.ipcall/databases/call_log_db-wal
| MD5 | e6173183d630ab163a0940e386ec30e6 |
| SHA1 | ebc38984a4a96c8165140983c079d20706e8a461 |
| SHA256 | f6ef567132cfd5d490740f33a850284d6827ddaa079b4c9f9b86765a6217e887 |
| SHA512 | 666c691803296ea31092144d1e00d11aa69989295b0556dbaf6a9a84b90d0ba1a273e37338bdea3ad7b48779410855875b6d785c36e754ce63c11bcf64c8e0c8 |
/data/data/cn.pyt365.ipcall/databases/myDB-journal
| MD5 | c5815fdf88730b976382f0e95aa3f63c |
| SHA1 | e93d5b3a6eacef2e4583aa0c1fa72ea1b15a4662 |
| SHA256 | e7a7197112fccdd82bcf76be59183373c61c2c7bb6f4dcdb1b6adb8b102c54d9 |
| SHA512 | b9798e16d6971b476b9468211f1d4fcd9197f682f5be0cb8fa60ec3bb02ba048ef3af28a128729606cc450458574c8f45f3a1e593fe3a56e323c880b4cd7207a |
/data/data/cn.pyt365.ipcall/databases/myDB-wal
| MD5 | df85d9ce8da4f3a3de10fbf8ca124056 |
| SHA1 | 33c807c44cecc0673f45e8d230152889534fbfca |
| SHA256 | 7d0e1a8e1f4252ff34866bc393ab98c45a55740947b74735e4f6dcee370a9e4d |
| SHA512 | 62685b383d9c1ab5c781d338a1d0d660f7c55b258ac665d5211aa6f7893a83130c867a66404c8ffa90f36d5dd2c373c0438e5f88c526eae07855c099137dbd17 |
/data/data/cn.pyt365.ipcall/files/mobclick_agent_cached_cn.pyt365.ipcall
| MD5 | d6000e174dcc36b5547361984fa8dd82 |
| SHA1 | f19e14015d1a7517d94e5f54682ac5c1cb04bb8a |
| SHA256 | 32d6dabc3a4f7e61bee21c76dc3cd65dc0c6852c20891b35089aa4c311fa6619 |
| SHA512 | 1b139c372fafa365042a49e8d7e21db4c91aabed322d02e8fb79c47aae2c0a6f500f6b77ce8a75e37f1a8b6f66046b7113ee670912e67f72dd7545aa72e62b9b |