Malware Analysis Report

2024-07-28 11:29

Sample ID 240613-emesraxcrr
Target a3c4d4ed46593faeb0293f493d42960c_JaffaCakes118
SHA256 8e4a68e862d0d73d9c434faf03d2937a4ce8b22f948ec7d046f63527a0323525
Tags
discovery evasion persistence collection
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

8e4a68e862d0d73d9c434faf03d2937a4ce8b22f948ec7d046f63527a0323525

Threat Level: Likely malicious

The file a3c4d4ed46593faeb0293f493d42960c_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

discovery evasion persistence collection

Checks if the Android device is rooted.

Queries information about running processes on the device

Requests cell location

Acquires the wake lock

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

Reads information about phone network operator.

Queries information about active data network

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 04:03

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:03

Platform

android-x86-arm-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:03

Platform

android-x64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:03

Platform

android-x64-arm64-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:06

Platform

android-x86-arm-20240611.1-en

Max time kernel

176s

Max time network

185s

Command Line

com.kira.com

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.kira.com

com.kira.com:QALSERVICE

com.kira.com:mult

cat /sys/class/net/wlan0/address

cat /sys/class/net/wlan0/address

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 app.51qila.com udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 1.92.77.21:19000 s.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
CN 123.60.92.210:19000 sis.jpush.io udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 easytomessage.com udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 113.31.17.108:19000 udp
US 1.1.1.1:53 _im64._tcp.jpush.cn tcp
US 1.1.1.1:53 139.9.138.15 udp
CN 113.31.17.106:7000 tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 1.92.77.21:19000 easytomessage.com udp
CN 123.60.92.210:19000 easytomessage.com udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 123.60.89.60:19000 easytomessage.com udp
GB 216.58.212.202:443 tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 113.31.17.108:19000 udp
US 1.1.1.1:53 _im64._tcp.jpush.cn tcp
US 1.1.1.1:53 im64.jpush.cn udp
CN 119.3.188.193:7000 im64.jpush.cn tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 119.3.188.193:7002 im64.jpush.cn tcp
US 1.1.1.1:53 139.9.135.156 udp
CN 113.31.17.106:7000 tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 1.92.77.21:19000 easytomessage.com udp
CN 123.60.92.210:19000 easytomessage.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 123.60.89.60:19000 easytomessage.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 113.31.17.108:19000 udp
US 1.1.1.1:53 _im64._tcp.jpush.cn tcp
CN 113.31.17.106:7000 tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 1.92.77.21:19000 easytomessage.com udp
CN 123.60.92.210:19000 easytomessage.com udp
US 1.1.1.1:53 alog.umeng.co udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
US 1.1.1.1:53 tcp
CN 119.3.188.193:7002 im64.jpush.cn tcp
CN 113.31.17.106:7000 tcp
CN 1.92.77.21:19000 easytomessage.com udp
US 1.1.1.1:53 sis.jpush.io udp
CN 110.41.162.127:19000 sis.jpush.io udp

Files

/storage/emulated/0/tencent/imsdklogs/com/kira/com/imsdk_20240613.log

MD5 520fe91c60a8ad5364bd38a9e8ba8b72
SHA1 6fc6193f816a598f91bfaf038ccc32a6d291eae1
SHA256 91d583a7e5cbda4dfa8c6954360917f9c514780bd4c064ce707a185d863df90d
SHA512 bb940e262df885b4daf9003869e1f03d95de1d3ba35446fba390fcb86b4ba0b084b9096960e30da011634be34a2be0dbbf11d0fd33138f9edab9773453eb569f

/storage/emulated/0/tencent/qalsdklogs/com/kira/com/sdk/sdk.24.06.13.04.log

MD5 42e51209a602055567417939b93cb217
SHA1 efbd28912a447b6a8ec750b73048f74791bc1c40
SHA256 8e2bef2efcb827190159cdfa49c7adc610b7e70bca05c37cb6e557799037c71b
SHA512 bff43f8a5185a593d38d09ca9a176694a50f1c9747d61ec8ad3aa4ed688e159a5e21991454deb0d1d45fb353d9926d6210499a21ffd13ec56f33b6654f1466b1

/data/data/com.kira.com/files/tls_device.dat

MD5 e266308aa17a66b0cb116fe8c516919a
SHA1 fc49336ee7466ca2657806cd11224926efcdf687
SHA256 dced3d4afe6ae34d98a719e8143a293d9bf23ed9b351894f3ea4a8753118a6dc
SHA512 4ce0ea8b62e0135ff951f0121e94fe70bba5c4152943ee2ad74613cc983a2b68cf6cd05cec1bbe2d6dfd81ef5b5ebc4c546a47511d2a0f3920c1e9655b515110

/data/data/com.kira.com/files/umeng_it.cache

MD5 9adbfc2bd5a7e3d6264cd6151b06c741
SHA1 0a95878640eac24013a27fea368da67acb34615c
SHA256 748d63e36dfd6eaf8a76dda0cd78844aeb8ecdfe9c7a4effda6979f6839e12bb
SHA512 d456574f73d7611e4b2faf3d514090e0410c21d94504171b99196101e507597a2953ab890ba363f880f3b39c97cae87abf865cfbd5b7232ff339ddd44153fc2a

/storage/emulated/0/tencent/qalsdklogs/com/kira/com/sdk/sdk.24.06.13.04.log

MD5 2b75a5ad903ce8b927776c59a4789d16
SHA1 0ae45f3817156530ad4ff0f530ce0e47399f65c8
SHA256 2e0ae18c1205db631c5dfc24ab98a004f9a96a10b4dd769a012144cf91a7de33
SHA512 31d2fe23786861ceee55284f1789668d38d33e037591388f76a07859e3391e0a76dd554272f64fcf0bd62004cf3dcc51dc8965d0c0e10fb253051f40989c3534

/storage/emulated/0/kira_error.log

MD5 b7f27b048e6b0495f7a5875c1d5326a0
SHA1 7aa4940e7f3484b574ad450c5c083ffd60224796
SHA256 26f772f8551923734a5f35d67462d89c6c195f1bca45eaa78032d621f054d80c
SHA512 82fbc12c83f57bf6ebcbe7448c4a7d20e8d550d00062a34bf700e5d992ee951d91fbdf08ca3de8cc3282b6c49a514da5f433a22c4d1d22429c620f12eb664e54

/storage/emulated/0/data/.push_deviceid

MD5 e0a66ea1b2205e4a241426867e16333a
SHA1 56d6aa0664c512245122cb443eba1581fb452f9a
SHA256 626685eaf19bd1e2922a9b7bd911a175b5d2ab8be021d8cac489086e331f9156
SHA512 7daba6925bf6fe308ed387ac15685d49bf22f0ea2df05f160b724fbc05ef055cb3a78354e22adbd6dfaa69bcf6ced02fceae2e4099c375ce330076337834af6c

/data/data/com.kira.com/files/mobclick_agent_sealed_com.kira.com

MD5 dea98182cf9b7b87b66cb0cbb1660bcf
SHA1 fc02b5bbaf3a8179f45ef3cae36210fa110c8fb3
SHA256 48fbcbaecf612604bab2fda1b06b4c6830ef6b8c2bd5771c61562bad8886b439
SHA512 895536cf2fe7d3d0188c15119593dbce357dbe3c98eebf0c0756b61f1051a81fb555a3400e44ebd23793059dbebfde4a52aeb90e11098051a6236b7fe4ce16ce

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:06

Platform

android-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

189s

Command Line

com.kira.com

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/bin/su N/A N/A
N/A /system/bin/su N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.kira.com

com.kira.com:QALSERVICE

com.kira.com:mult

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.201.110:443 android.apis.google.com tcp
US 1.1.1.1:53 app.51qila.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 119.3.253.130:19000 s.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
CN 110.41.53.90:19000 sis.jpush.io udp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 easytomessage.com udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 113.31.17.106:7000 tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 119.3.253.130:19000 easytomessage.com udp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
CN 110.41.53.90:19000 easytomessage.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 123.60.89.60:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 113.31.17.106:7000 tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 119.3.253.130:19000 easytomessage.com udp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 110.41.53.90:19000 easytomessage.com udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 119.3.253.130:19000 easytomessage.com udp
CN 110.41.53.90:19000 easytomessage.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 123.60.89.60:19000 easytomessage.com udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 124.71.170.130:19000 s.jpush.cn udp
CN 110.41.53.90:19000 s.jpush.cn udp
CN 123.60.89.60:19000 s.jpush.cn udp
CN 113.31.17.108:19000 udp
CN 113.31.17.106:7000 tcp

Files

/storage/emulated/0/tencent/imsdklogs/com/kira/com/imsdk_20240613.log

MD5 c0e0f7629b07659cd36561ec3310f9b8
SHA1 1c4ffde37536597c328ed99271c21da9482e2fe3
SHA256 3ffd087f5dcd89b32c939bace0143e3e3abf3ed2e404f513f2d37843393107cc
SHA512 e86f9e5ab820ef40cc30889d597655016dc486262309f1cfee96d18e48085987283b8954bb754a1c094b59ea451aa34158f286c1198f1b9b62147f110b8622b0

/storage/emulated/0/tencent/qalsdklogs/com/kira/com/sdk/sdk.24.06.13.04.log

MD5 fac693544d54185e5dc491b5cc9ffee0
SHA1 001d2398d4a8ca17704423d48344cf69765c7393
SHA256 7a59fedbe9e0d0c81024a55cfed0003d9c62812be86099657f5bcb9f6d6a3dbe
SHA512 f55ffbe8bc41c9d563bac032412ddab3533f9dcf542617f55208d881d17af1c33e883f22cd8bf0d505356edd42cfef43b03c234a1c3f7682735f8318cc0d6e57

/data/user/0/com.kira.com/files/tls_device.dat

MD5 a215f571e00d1046294307fd36326a94
SHA1 6a6afce2924d29cf431b5eff6ef86f9e8164ccb7
SHA256 9cb916f148a5ab24e8e7c950141a842450b395c60ff838b27ffe806e0b6103a7
SHA512 60785f8ae3e711fc84c98b96b1e9d9b0994d66179cec285e5e8b8cf655b7b1bb6ea57898af3f46a676f1e5a8dd3bca8ba9a40ab450f708515abec6254046a2ab

/data/user/0/com.kira.com/files/umeng_it.cache

MD5 af327d417d99c1a4b6136055129ee7de
SHA1 8b03e33b7d7f02892bc5bcf02a04281c62fa8364
SHA256 22e27be57fc32933c7f63c50110ba8c07199955f22b6b54081a3116aac1df38b
SHA512 a71fe261749a79ede681561aa507cbd4cfa10607bf29feb2a7fa9701c95ffec2a13fb26312a3fb68a81006ff6a735203f7a94564aef624cb2243500aff277f99

/storage/emulated/0/tencent/qalsdklogs/com/kira/com/sdk/sdk.24.06.13.04.log

MD5 9d3a9928e9c2878392485e73fecf8a7b
SHA1 febc428837db78f762efd31065b03ea932127178
SHA256 2e73972b1bb0ae835c658df7fdb6efe8c296cb718de49a55326d567b6317e1cb
SHA512 0fbae3220a3e9ba0d9da6edabade3e7fca562aa97a1822259303ecb25e4b5d48976aaa329bfe8f45d3bfb27c5edbaf5740142a6344595f9d07a1f6ad2770417c

/storage/emulated/0/kira_error.log

MD5 7dfbc3b7edd684e84822e34fb9991772
SHA1 e9e6beba8e7c58b8f3b462829baf14d9cf7e21da
SHA256 a2ace2f92c1fddcbe64c3196546ed2b5e8db03e06f3cc68508b7dfd96150ff46
SHA512 c82f9de6a195c83af396405321f21326e2aec61162895e3566510027b42e73657c200e1e29eeec8fd1a31a477d9febac0b0f10a27f33726c8ad0b40a4a1ff628

/storage/emulated/0/data/.push_deviceid

MD5 9030dcc1ecbfd0f40397d68b792553c2
SHA1 accb627e40151ed4c81ed0637e07356f4129d4b2
SHA256 31d8c75e2f0d7a7f4641620bce518e56d39801b1de73a2422a89e16ac13efe67
SHA512 dcc36cfa838429c55c98096a3ab25b13c0f27d77d34d0b75d68f3145d7d5dda396f9df74a26355180687d70950ec500d1fb7de7789472281fec2c6d522e18cad

/data/user/0/com.kira.com/files/mobclick_agent_sealed_com.kira.com

MD5 cb025372f581d9b822232bd3c84c3a2c
SHA1 404bdf3f0bb9358f9d8c6881b0a0004837f16a06
SHA256 88227d3e698e674ec72811a9b13dacb37297408e6b6dfa9c0d1d835da69f504e
SHA512 00f78b3abc398e102aea47ff1062f7a9ee90b3bfe81648cf2181b5c3a8ab8668c929c20e754248b9f74b32fc2f2458e428d21d5f60206535f74780b712791d9e

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 04:03

Reported

2024-06-13 04:06

Platform

android-x86-arm-20240611.1-en

Max time kernel

3s

Max time network

141s

Command Line

com.alipay.android.app

Signatures

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Processes

com.alipay.android.app

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp

Files

N/A