Analysis Overview
SHA256
06d48cacb868094a1f52a9e2908a3918d19a910224f78736ea1801ba2836682d
Threat Level: Shows suspicious behavior
The file a403aef7ce1ffddc82ba7edb75f9f511_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about running processes on the device
Queries information about active data network
Queries information about the current Wi-Fi connection
Reads information about phone network operator.
Requests dangerous framework permissions
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
Checks CPU information
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 05:35
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 05:35
Reported
2024-06-13 05:38
Platform
android-x86-arm-20240611.1-en
Max time kernel
64s
Max time network
137s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about running processes on the device
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
| Description | Indicator | Process | Target |
| N/A | alog.umeng.com | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Reads information about phone network operator.
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Processes
com.ganji.android.garield
com.ganji.android.garield:pushservice
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | mobds.ganji.cn | udp |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | register.xmpush.xiaomi.com | udp |
| NL | 20.47.97.231:443 | register.xmpush.xiaomi.com | tcp |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| GB | 216.58.212.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/data/data/com.ganji.android.garield/databases/userTrace.db-journal
| MD5 | 67f9112739af5ad4e8e83b5d1e3c745d |
| SHA1 | e3e0ef6cef29bf3467608818a0f61e0b8c0fc7ff |
| SHA256 | a82e95d42273c30bd49d17cf6cdddedf84b6734198486044b689bc7412199ef8 |
| SHA512 | 35ddd25a8f991f991734f8cf2d03492675e4f5761532da9aae301a98853197966bc981ac5883a2e9da77fadb1790304371e4eb27e33c7610461fb4940422dfc4 |
/data/data/com.ganji.android.garield/databases/userTrace.db
| MD5 | f2b4b0190b9f384ca885f0c8c9b14700 |
| SHA1 | 934ff2646757b5b6e7f20f6a0aa76c7f995d9361 |
| SHA256 | 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514 |
| SHA512 | ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1 |
/data/data/com.ganji.android.garield/databases/userTrace.db-shm
| MD5 | bb7df04e1b0a2570657527a7e108ae23 |
| SHA1 | 5188431849b4613152fd7bdba6a3ff0a4fd6424b |
| SHA256 | c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479 |
| SHA512 | 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012 |
/data/data/com.ganji.android.garield/databases/userTrace.db-wal
| MD5 | 1856284307ed9750f06d5f7675f1911e |
| SHA1 | e78884d09f5d803c8849fd43d604a17b11d19a29 |
| SHA256 | 9c570317bc252d87d3bc5163dc998a70f204ebd75726c37583533e5de4f1981c |
| SHA512 | 6a466197588fb9f5942ae5ee22b1205e93f27baf9a0258812e365a3a1b2ed004985d4d72880a9f993222d65bb460bd3fb530cb1c2ff5390e748832c5a2f7dcc5 |
/data/data/com.ganji.android.garield/app_sql/ganji.db
| MD5 | 318764b23b048b32aa3d4bd1a203d417 |
| SHA1 | d4353f234bd90a21408e6b35204c23890dfd24eb |
| SHA256 | e197f767f83f55126d8a0c496367a3e8323f3459ce3d5f2b0c29cda27874dedb |
| SHA512 | e487c05bc6e509310ea47c03b37fd5d338faee4ac3aac4bd3e6998449c1731e3704782926f88342026fa8d3ced0e3632c8d27dd5a930096ede1ef48a98ab7076 |
/data/data/com.ganji.android.garield/app_sql/ganji.db-journal
| MD5 | b040ceaf854123efb54679aa5802434a |
| SHA1 | b54f87592d0ca5032c25f383a98fe312bc97370e |
| SHA256 | c2df46aa72148ece4823ebd58ecd7a934b3ebf63534906f56bc5a41a6947cf64 |
| SHA512 | 7da8704b9d3e476e415f59e72df783a3f1c2c412ed8243fa53889fe647c487717e7eaed5cdc1260b26ca1b2b0eaf400d577202a475ffc0966c1b1fc8d7579307 |
/data/data/com.ganji.android.garield/app_sql/ganji.db
| MD5 | 2c988bfec312f7b0636d0597a76ca4f7 |
| SHA1 | e55746f2b59dc8098bd95f780936e6a1a7e899ec |
| SHA256 | 1d33bc0d8cdd4eaededc39fdfe5f4f773521363b4f034af6aeecc9cd47701ab8 |
| SHA512 | 766dae637adfb9a0405ca75bdfbe4b37a9bfd9bdd68869b47af7581424e8f698c9f8d1f20e455503cec4b164b1925cbbe8ab1df60daff82b222817a1ca9f0192 |
/data/data/com.ganji.android.garield/app_sql/ganji.db-wal
| MD5 | 4652d2d919f3e4fb605ddca94d78de1b |
| SHA1 | 73c963ced7a7754f7011a627c590bf3a7e979d8f |
| SHA256 | bf3283a4eb441f1896109c205f460a14aa07184acb62d30209a901a7483e78f6 |
| SHA512 | b6f21b3c91ae7c8bcf46693e65b6c80d062e12eda4f7e6739187a3d38b196d03b47173f643fa738f49bfa935463e930623abd0ede11f0bcf1b151bcc75920cde |
/storage/emulated/0/mipush/log/com.ganji.android.garield/log1.txt
| MD5 | 710f0d80a3d6da7a5a32ebd562460fc8 |
| SHA1 | d3a4b78b4f993228cd37b835836b0dcc12153e6d |
| SHA256 | 226cb7fd2b509affb55ed7c223e859c17be19dfb96f820dd0958451bfed125e3 |
| SHA512 | 19f54e1db49a6e3945da0953c610534fd500ca196239a5c4811065e7180aa2dc4f1c95605ba05d9a2c8562312ccb814e03b0a33b256a10cd0d709b8beed78a9f |
/storage/emulated/0/mipush/log/com.ganji.android.garield/log1.txt
| MD5 | fb03a026258bee4a8b2420af02db039c |
| SHA1 | d7b7c14433804d88b14026290826f5fd49e154a7 |
| SHA256 | bf19dc2ee94a2420f9d3f6b49299cbc1d9daf29c2ca453aac86a6b8199ca07d9 |
| SHA512 | 52be4c351cb61e77093966c83dde3affda7c249abcbb1e9644f66aaefe9c43f9d72a25cb6ecbab8ee8740ba1452af8bbb79799b5b10210f863a688705c66f988 |
/data/data/com.ganji.android.garield/files/mobclick_agent_cached_com.ganji.android.garield
| MD5 | 1d90efe8c4d4134d8e60ef75290dda94 |
| SHA1 | 24c23f4626a64934aacaaf6363f44366821de499 |
| SHA256 | c3bbd3054c1a7b13c2d1d60202a7b753d94963214f7ec7d021bbe2623a58aace |
| SHA512 | e20fc936d4d060885a13a7d906ae757eda42e283462b717709ddd05e4c50eca3b709fb1679946113b0d369b2d2c04a739af502380603a541cbe0f92f9d15c2d8 |