Malware Analysis Report

2024-07-28 11:30

Sample ID 240613-h7gpmaygkh
Target a46685d937b9fe6cb1babf3bd96a6742_JaffaCakes118
SHA256 b388e52a6b3fcc3536dc5293dfa11aa9b9be0c874b657f158c01e8e3ecce93f3
Tags
collection discovery evasion banker impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

b388e52a6b3fcc3536dc5293dfa11aa9b9be0c874b657f158c01e8e3ecce93f3

Threat Level: Shows suspicious behavior

The file a46685d937b9fe6cb1babf3bd96a6742_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection discovery evasion banker impact persistence

Requests cell location

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Requests dangerous framework permissions

Reads information about phone network operator.

Queries information about active data network

Queries information about the current Wi-Fi connection

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 07:22

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's calendar data. android.permission.WRITE_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 07:22

Reported

2024-06-13 07:25

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

157s

Command Line

com.alipay.android.app

Signatures

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Processes

com.alipay.android.app

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 172.217.169.10:443 tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 07:22

Reported

2024-06-13 07:25

Platform

android-x86-arm-20240611.1-en

Max time kernel

140s

Max time network

178s

Command Line

com.chinat2t23808yuneb.templte

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A
File opened for read /proc/cpuinfo N/A N/A

Processes

com.chinat2t23808yuneb.templte

com.chinat2t23808yuneb.templte:bdservice_v1

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 www.yuneb.com udp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 1.1.1.1:53 api.tuisong.baidu.com udp
HK 103.235.47.247:80 api.tuisong.baidu.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 137.175.39.7:80 www.yuneb.com tcp
US 1.1.1.1:53 api2.sharesdk.cn udp
HK 103.235.47.247:80 api.tuisong.baidu.com tcp
US 1.1.1.1:53 sa.tuisong.baidu.com udp
US 1.1.1.1:53 sa.tuisong.baidu.com tcp
CN 36.155.169.217:5287 sa.tuisong.baidu.com tcp
CN 115.227.43.65:5566 api2.sharesdk.cn tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 www.baidu.com udp
CN 36.155.169.217:80 sa.tuisong.baidu.com tcp
US 1.1.1.1:53 api2.sharesdk.cn udp
CN 115.227.43.65:5566 api2.sharesdk.cn tcp

Files

/data/data/com.chinat2t23808yuneb.templte/databases/database.db-journal

MD5 72093b44946d29880655f99c388ffbc8
SHA1 b50765c1e680a75544f122cc886669a8efff5d74
SHA256 dfcd7cddae74ad6c7ab15d2b921ac926e4617e90670d14d97d0a5a8697e27177
SHA512 007f31dfe785c2e1df40483629298e32dc5249f97908eedebee33b3dd4a83a3efae2f0f8de53e45146f69079965e5b5d6ef3aee32ef409bbc80da37fe1019e6d

/data/data/com.chinat2t23808yuneb.templte/databases/database.db

MD5 6a33111595b8a030280c63f8b5ca8997
SHA1 db9f9da92efefdc5e29d9b2c6dd12a71e0fa6d90
SHA256 816818d34ab27b23587e892c11faf59da75fd73661a91754d9c34fd815a5695e
SHA512 08fb05153ecdfb1d499ae8533003a39aef126b2dc2afc4b022fedafb53a75212955e3df848c7c8f45ecbb19454ef44e97796cfe0df5362382f7843a05b3a199e

/data/data/com.chinat2t23808yuneb.templte/databases/database.db-shm

MD5 0b2bd2be6a028f074d773cd275e2fbd2
SHA1 cf8834bac8118ef82ad9c63e0d1f1126df56ce72
SHA256 364ac5f94ba1d4d5a26174a828415605d375235a3f3395a0147058b88c6c0f21
SHA512 67013c94b10a727fd05cbec48a7b1408f7de25201dd50d6bd4ee5cf1cd82c4f79c49fabd5d1d6403252630c27269d3ee2bcbc588985723f943c0f0f7de892820

/data/data/com.chinat2t23808yuneb.templte/databases/database.db-wal

MD5 701d995e7efb93789b91d9637856dad8
SHA1 46851da3ac3b90a1323e724808da3a1b327dc4f2
SHA256 5ed4dc78287ef1994ae67d324b6e11a9be8bf9eddc73ab76a7f988028d72ca57
SHA512 c589941374b2590b65675848b11ead170583fc37e61833a17d6bb0724bc51d6d233ed344ec5824ff933ffbbd65c161db62f9f06b4c3e7108fbe167307ccf1f49

/storage/emulated/0/baidu/.cuid

MD5 e7bad85870578aff6704f3250308110a
SHA1 484a1fdee427abd537a4edd019b871a1a8ecd7f3
SHA256 b7b8ba1ab7bb69491d9744c2e35a2ab63b5570804590e47b210e69598ad98879
SHA512 856655715053c8a1fe4a0430b366d534ae2f66f7c7ccd8f7fe219db1094adb868b54bf74b571fd8316c874e7fb1103dfade9241a3a02e97c09c7fec6d3babcbe

/storage/emulated/0/ShareSDK/.dk

MD5 2bc335b9ecf0f478085f2cfb59b40535
SHA1 8740bd07ef6f9896f926d8b606e7ca5ea1b6b4dc
SHA256 0a9d3c1f05d06861ea4b33dad8759ae0d9265df10df23723587223b14dd78ccd
SHA512 70c11cc76d8df82e66b97a2f593d7e94cdb691f8de2901f92a15be0f393e43ec996b2fb5772b1409e1b6c30df4b057b845079f6b34a1f5d155e72f1ff98eb5ca

/data/data/com.chinat2t23808yuneb.templte/databases/pushstat_4.6.0.db-wal

MD5 6ad551b7d985ef82f05f081ad0fd3767
SHA1 c02861fbd2b91aa2b9466493e26d04d43c62ce8b
SHA256 6fca7a071f2845318a405c71114de8962ea9e33cd556a8acf829d39b6f5dea7c
SHA512 c083930d143c0033cd50e450e344c8eb81fc05abaf9bf2504302785d6a8655218f33bdfb46328f1990106259e59ebb3e6c220a0596cf9c4fd6f97c0948ec3c18

/data/data/com.chinat2t23808yuneb.templte/databases/pushstat_4.6.0.db

MD5 4a8dd68fc4ca419f6c1d386cbb11459c
SHA1 134e958d4bb38618b32553bc2ce907034bc62e93
SHA256 14f49e7dc34978c25cd3fc2d552424b2348f6e6eeaed7101cc8a05539fa1a0ef
SHA512 79e8aa1e11c59b095de679b7cab962a288b2fc4ee42d84cebdd922226458a72feb6b30031fef6aab2efc3b289dfe42149e4bf714d37a884bdc779a27868ecf75

/data/data/com.chinat2t23808yuneb.templte/databases/pushstat_4.6.0.db-wal

MD5 215c0d56f385c7f8bb9a83d9c24f45da
SHA1 ada2d46ff2a157a40820d2d6767185d667c26804
SHA256 bd390b0639eb3f6029fb2b98d474ca2e1836f8ec7a7fc01c2b0862e4d2b7f672
SHA512 409314b9666322f95f42d4f1353a1bf3448a14e8baee25fd860d92c381cf9f710de07c349c21e698da87597a88a162ba5ea3cc3f74f8db5e3212d103e8d0c59b

/data/data/com.chinat2t23808yuneb.templte/databases/pushstat_4.6.0.db

MD5 bae99c9ad96072979500124b2c5a7a06
SHA1 7a4868ab4797fb84493a1367bf991b25402faeda
SHA256 ddabbab1e744a42a6179fcd4491a05457a40acc98046fca13f3ba8019ede07dd
SHA512 9c87114e2758a4316e0abefcb9f5d22cae9aabc69de44dd174b731e54519bc0bcd835f64a44b4cb8f4d425e59b7c7ee8f2bd8829fdfac982e6454cc584f0d838