Malware Analysis Report

2024-07-28 11:29

Sample ID 240613-jznzeazgmd
Target a48d29c62b4e5381a62fc27fac1076dd_JaffaCakes118
SHA256 f3019142dd235b72a73cb1b2cb6eb0c1479d46e31307c635459faf496969f535
Tags
banker collection discovery evasion impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f3019142dd235b72a73cb1b2cb6eb0c1479d46e31307c635459faf496969f535

Threat Level: Shows suspicious behavior

The file a48d29c62b4e5381a62fc27fac1076dd_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection discovery evasion impact persistence

Loads dropped Dex/Jar

Requests cell location

Queries information about running processes on the device

Checks Android system properties for emulator presence.

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Reads information about phone network operator.

Queries the mobile country code (MCC)

Queries information about the current Wi-Fi connection

Queries information about active data network

Requests dangerous framework permissions

Listens for changes in the sensor environment (might be used to detect emulation)

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 08:06

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 08:06

Reported

2024-06-13 08:10

Platform

android-x86-arm-20240611.1-en

Max time kernel

19s

Max time network

159s

Command Line

com.sg.atmlmzbbcr.mi

Signatures

Checks Android system properties for emulator presence.

evasion
Description Indicator Process Target
Accessed system property key: ro.product.device N/A N/A
Accessed system property key: ro.product.model N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg_game.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg_game.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg_game.dex N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Requests cell location

collection discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo N/A N/A
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.sg.atmlmzbbcr.mi

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.sg.atmlmzbbcr.mi/files/oat/x86/sg.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sg.atmlmzbbcr.mi/files/sg_game.dex --output-vdex-fd=112 --oat-fd=83 --oat-location=/data/user/0/com.sg.atmlmzbbcr.mi/files/oat/x86/sg_game.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 switch.zjmgc.com.cn udp
US 1.1.1.1:53 1.cn.pool.ntp.org udp
US 1.1.1.1:53 data.game.xiaomi.com udp
NL 20.47.97.231:443 data.game.xiaomi.com tcp
US 1.1.1.1:53 id1.cn udp
NL 20.47.97.231:443 data.game.xiaomi.com tcp
US 1.1.1.1:53 data.mistat.xiaomi.com udp
NL 20.33.39.104:443 data.mistat.xiaomi.com tcp
US 1.1.1.1:53 oss.migc.g.mi.com udp
NL 20.47.97.231:443 oss.migc.g.mi.com tcp
NL 20.47.97.231:80 oss.migc.g.mi.com tcp
US 1.1.1.1:53 pg.xdrig.com udp
US 1.1.1.1:53 conf.xdrig.com udp
NL 20.47.97.231:443 oss.migc.g.mi.com tcp
CN 114.67.244.173:443 conf.xdrig.com tcp
US 1.1.1.1:53 av1.xdrig.com udp
CN 116.198.14.59:443 av1.xdrig.com tcp
US 1.1.1.1:53 0.asia.pool.ntp.org udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/com.sg.atmlmzbbcr.mi/files/sg.dex

MD5 e1f53e669330daa5bc3f951729ce1c33
SHA1 3d83f72d80e965357197412b991ca9d54b06ffa7
SHA256 c8b0a3374493421a9ac14206509d481640a4dcf6696c08f5f151e1ceda5123e5
SHA512 03e312b522f163794daffd739b21c22fd730ee627c3f37c67321019f64ab272c2018363e0aa621af6c16052afa5fc010f3cf7df9828b069d3622b438b83b5728

/data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex

MD5 f2ffba48fdc36030e4ed6501ca207a60
SHA1 937f00215c03f56e94f8a3da3112f06914a0805c
SHA256 d9f285a35715dc83ba5f3420f89605899820c49f9a2cc09b1e91dda2f2396678
SHA512 3d478ba33603fc29fab322c3ffd86721ece5fbbcd2f0b9a171af971c342f580a2c68f5c7a1c8668878e2481a70f2d64ae009cc875ba8af1bdcb685cb0c609613

/data/data/com.sg.atmlmzbbcr.mi/databases/report2.db-journal

MD5 04dcfd8d2546b12dca311bd047f9389c
SHA1 25514b19a72d21f8b1e2d88b1a48998198485ba0
SHA256 5663125c70e7faf81d06829d0f31133a57c61f371b3096dd9d94354d5d9f5f6a
SHA512 fc247e40ac0754a4a8f6fa6bf1df4a4c4c8d635791abfee653e1f7a11dfb9e97cf840261393a11a8b36258ec4d15b7fbb28f853a6c8814afffa653ac4e59a76b

/data/data/com.sg.atmlmzbbcr.mi/databases/report2.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.sg.atmlmzbbcr.mi/databases/report2.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.sg.atmlmzbbcr.mi/databases/report2.db-wal

MD5 a9b06a8e8563c267a4c6062f6a1968bb
SHA1 a5742b8d6aa3cca61531791e9045aecdaa4d5fca
SHA256 0b03df22214f9d651100e73278ab3cacba996b3756be737323daf121203320c1
SHA512 3f8a60da0261d535fcd45240ed90c1f37126c6c201ce38d0232ff161e53762e8ba43375483336e8cb9c4479d1d6e6661f9121b54e54cc44ebb48ae58efad79c4

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db-journal

MD5 bcb48854545ba44a6a469c1742aee6ba
SHA1 290021f11ee556c2b1dbb1945fa712fedc0a0e52
SHA256 ea220156f9f77520b4e51af4b8f58f3b2fcbc4ca20f33a064223fed413eefe5f
SHA512 6f0f4ac28347eba07f88796c234c8df34d0c4b3f253df5eeb627ae2e1397d8070801e895ffa6c8605f12d2a0376c2065f9e55562934633e4b0b6926d207e349e

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db

MD5 a64ed0db240d3914f2690223fd92d8ad
SHA1 05611a85274356de18c74747de7f30df7f286ba1
SHA256 a0a6b263087fa8fb9d8d85ace11c0391b7cf399da8b4471c62c8b05cab975813
SHA512 2ea50db3f02da45df15f983b0edc5ff060468f250293d09bd1bd9cb5ea37cf282a57cb69cbb6638dfbf5a161dcb002438895449364b636fa7849e5cfc883da13

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db-wal

MD5 0ab5035f576407b49c957de83d82abfe
SHA1 1cea162227ea6043c4fcd884d0a441df5379a6b6
SHA256 27c0f4225e908c54dd92ccbced4edff103768387d557072359ef2b3b9c5486f7
SHA512 e3aacd017ab0add6b68b4dbad7e422305e70843643c38fd55d3ca4cccea480e4a24b0c02953ee548d8e775bba58ecbb99a281c6f7e4d855f7eee9463a8fcc363

/data/data/com.sg.atmlmzbbcr.mi/files/talkingdata_app_process_preferences_file

MD5 ecff44b99f939261eb038b79f0c2bb96
SHA1 a773d3e9b99464aab9ac0bd8b64c459d5c0bae43
SHA256 865303adbab053b295974eeb67565216249ea107743f790f5783ef01cfb2d856
SHA512 82fe4357b1ab4432a1b6ee9c8118ffd4dfe2de62563a7200b19656f7ed003126127fb390430d87529c9e1ca104967fb1704bdf2f2ab5555f8b66b5392f0ec9b4

/data/data/com.sg.atmlmzbbcr.mi/files/report.log

MD5 54c6c7f61590c688cdfd6a856496face
SHA1 be8824ac577fc820746e4dde440a552c50d206e7
SHA256 b440be35446d7a5980b8935a659ba778493878515a61361f887c76bd2973cfe5
SHA512 549eb3895950e01b168bbb7675c01a0705abc5b01dc5251e22289df8db9fb9b6f408419df7fabfc8918c72caba187add159c2a8ffa29dd2cc879606558aa213f

/data/data/com.sg.atmlmzbbcr.mi/files/migame.cfg

MD5 340611b379e362128c71623c5e8da1b4
SHA1 0673cee3ec93948c5474f182f9bc0bf0dbc0076e
SHA256 ecbb19ea2633933cda78f7ff1d954581fb582f04a4ef3104c28b20c9afe65f69
SHA512 7f6aa02295b963c4f3b1f93118e5a5230d163b54faafd0efb2ce3d5a8af9f1d8327f612013332388a6e10fb851496e147e300acc4f8d79389ffbb04ca2dd7555

/storage/emulated/0/.tcookieid

MD5 af32628105b707bf91d1d13cabb2a6e8
SHA1 a36559fb1da43e101b9374d766e32e3faf13d1b9
SHA256 7910c06d4c1dc67f3ac9ed5f87e545bcc3c2f79957e76ba86f6a2e8c26e3497a
SHA512 2de687bda581c04184147653042cdf59df8ce6a193e689b5be96400c9dd03044db25c4e8186dd936dc6315e4295dd04ca6a2efe14f3413df5c6830618fe3be39

/data/data/com.sg.atmlmzbbcr.mi/files/talkingdata_app_version_preferences_file

MD5 4e732ced3463d06de0ca9a15b6153677
SHA1 887309d048beef83ad3eabf2a79a64a389ab1c9f
SHA256 5f9c4ab08cac7457e9111a30e4664920607ea2c115a1433d7be98e97e64244ca
SHA512 e053886e1b797bc5a80f932302f0201265a599d82e2502d41941d6e652614ef88fa058e009094d26655f880200df12c2100f690254fd1e5bae75d7441763cd33

/data/data/com.sg.atmlmzbbcr.mi/databases/talkingdata_app.db-journal

MD5 cc349b3bf4996d0961207f9814000ae1
SHA1 27bc040495e22898e6ae4638603517d1d80426ea
SHA256 a7e344c138eaa2d0dfc77dd6da530872a5d42418fdf512776acdba5b29c7ee65
SHA512 c30ce6c2257236e75c57744af566f714472b7788d433ed1ed19b151ff7f97dd730c58e162d1edbe88482b3aa341fc119bfd5f1df55041d511271e4436e01a31c

/data/data/com.sg.atmlmzbbcr.mi/databases/talkingdata_app.db-wal

MD5 285ac056453f971e39b5b4f8720512ba
SHA1 2fcd1a26c121486a42b96042dcc9a54531df5fdb
SHA256 6d488fe9994ef983463331fd2cfec3dfc64be0d1ed5a64caa5360c1703ba27bd
SHA512 417ab4ba0865577e1aa141e17b594d73cfca435af435f2b7679f882743c1b67da34eeb7f7c34f1e0a0c7e0081b2233f413557bc72abc1dc2ee7f91633b434179

/data/data/com.sg.atmlmzbbcr.mi/files/sg_game.dex

MD5 1a0618007ee01ceabe9c61a78371c228
SHA1 b8c031be78b82df6c47fade06fa92a743a316cfa
SHA256 923ceeb63c9df40121fce12c499d1ed0be031a2bee94204b9530a02fc7880a05
SHA512 80ee7b93b7e8ceb6abc71a7597e166b1a30bed2bdca1919c21519b02ce392120f55acb0ccdfaecf551f6dc54f460e912b58411c896486772b182709cacb5ad61

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db-wal

MD5 e67deab27172e48daa9ee355183745a5
SHA1 890e86c4a4e0fd375b0dbce51d123f505179fab5
SHA256 1fd80119ccd2cad0f2e515a47f8dd41fed7a41e319cfeca8c5860fb9883218b9
SHA512 7e879dd420777dad4df97268a8a6d33134abb72c85d4c61426eb56759f70ecdcb8e37c72bc8647442b9e3eb65020caddcec4518965acc94614f02d732ac401d4

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db

MD5 342c62e1888c83d14c0d07b3be74dddd
SHA1 69fe7857311c5716a200766c7fdf20ea80c3a65b
SHA256 ae25e81dad719657d2bd3dd7a17586ac664c1851d1ed57cc16a0b5fccf3c2478
SHA512 5ea931cb117222e7b46415fd733d3ca8f5efb6d54374ab688083bdbe05b7694b3d1a93962125f58665f0d3a409e6e5eeda1914197c0a19e2cb592eba5a53c756

/data/user/0/com.sg.atmlmzbbcr.mi/files/sg_game.dex

MD5 379b606a0725b7c377142645e4485d65
SHA1 660a961ca2c664505633da672f1bf74c8a57828f
SHA256 009d06ad502041c42c3f1bb753fd155fb54331a775da6a8333fcf7d913f87404
SHA512 9e61ba87591f3914aa2b623fdf40673cca11bda377249d451de2746ca7df5bd0a10a6e4ac51d8359e7e519e66b8e5cd38ce9e03f17236a589e703084b42b2061

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db-wal

MD5 0cfde62aed26fa3ea790008d9df0b6ed
SHA1 d6863cce4abb21f189446585e1a166d2dc01812d
SHA256 574df171195f70299a6d6aefb4d8c7bf6f13e40965c1e0e57e79322d4ac81fac
SHA512 57f3e9341d7f7a90b337d30b765d334692ac017ab17679f1707dced5ce4ff0f98a387c6f056e0abac52fd83db197404f714167846da1cc80de223902d7edf0e4

/data/data/com.sg.atmlmzbbcr.mi/files/TDtcagent.db

MD5 6ca608dd19108fd33b9cc00ae1edf250
SHA1 4c42ef09ed4cf5a3e4bfa23a85219c9a662c5eef
SHA256 4d6da420a1c48079b24ff043a0af1414f1a5fc5e38e8a1ca8a46587a59e940bf
SHA512 3ea1811733ed74d5aecc9b39d398da5ebe699d5593af5c2d688a771b6e9596ce30d6809f2af779f2628987f0e36df09b555c08992a70d44b6d39ea241f9a04bb

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 08:06

Reported

2024-06-13 08:10

Platform

android-x64-20240611.1-en

Max time kernel

7s

Max time network

184s

Command Line

com.sg.atmlmzbbcr.mi

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex N/A N/A
N/A /data/user/0/com.sg.atmlmzbbcr.mi/files/sg.dex N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.sg.atmlmzbbcr.mi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 switch.zjmgc.com.cn udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp
GB 216.58.212.238:443 tcp
GB 142.250.200.2:443 tcp

Files

/data/data/com.sg.atmlmzbbcr.mi/files/sg.dex

MD5 e1f53e669330daa5bc3f951729ce1c33
SHA1 3d83f72d80e965357197412b991ca9d54b06ffa7
SHA256 c8b0a3374493421a9ac14206509d481640a4dcf6696c08f5f151e1ceda5123e5
SHA512 03e312b522f163794daffd739b21c22fd730ee627c3f37c67321019f64ab272c2018363e0aa621af6c16052afa5fc010f3cf7df9828b069d3622b438b83b5728

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 08:06

Reported

2024-06-13 08:09

Platform

android-x86-arm-20240611.1-en

Max time kernel

7s

Max time network

159s

Command Line

com.miui.ad.mimo.plugin

Signatures

N/A

Processes

com.miui.ad.mimo.plugin

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 08:06

Reported

2024-06-13 08:10

Platform

android-x64-20240611.1-en

Max time kernel

7s

Max time network

132s

Command Line

com.miui.ad.mimo.plugin

Signatures

N/A

Processes

com.miui.ad.mimo.plugin

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 142.250.179.226:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.200.46:443 tcp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-13 08:06

Reported

2024-06-13 08:10

Platform

android-x64-arm64-20240611.1-en

Max time kernel

7s

Max time network

132s

Command Line

com.miui.ad.mimo.plugin

Signatures

N/A

Processes

com.miui.ad.mimo.plugin

Network

Country Destination Domain Proto
GB 172.217.16.238:443 tcp
GB 172.217.16.238:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp

Files

N/A