Malware Analysis Report

2024-07-28 14:18

Sample ID 240613-lqd4ysxdlj
Target a4e83f9d44c58012e30d791cb3637bb6_JaffaCakes118
SHA256 2b07707f123933f8cd592c0d28bd12006c88d2732f6419f115126e5f3461986e
Tags
banker discovery persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

2b07707f123933f8cd592c0d28bd12006c88d2732f6419f115126e5f3461986e

Threat Level: Shows suspicious behavior

The file a4e83f9d44c58012e30d791cb3637bb6_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker discovery persistence

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries information about running processes on the device

Requests dangerous framework permissions

Queries information about active data network

Queries information about the current Wi-Fi connection

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 09:43

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 09:43

Reported

2024-06-13 09:47

Platform

android-x86-arm-20240611.1-en

Max time kernel

4s

Max time network

170s

Command Line

com.shengdianxia.pushmya

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.shengdianxia.pushmya

/system/bin/top -n 1

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 www.umeng.com udp
CN 59.82.29.162:80 www.umeng.com tcp
US 1.1.1.1:53 log.xinmei365.com udp
CN 125.39.25.100:80 log.xinmei365.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
GB 172.217.169.74:443 tcp
GB 172.217.169.74:443 tcp
CN 125.39.25.100:80 log.xinmei365.com tcp

Files

/data/data/com.shengdianxia.pushmya/files/event.txt

MD5 a39a7a18c0029f354f7741f74fcd80ad
SHA1 19f5e46f48e32d760a91af0caff5b5b91f4c8733
SHA256 12fb0e1bd004b409764d40c43fb4e8d54fe98403679bc2f7d98299477f7038f6
SHA512 8d77845cfb6dba39463ff6810930072b134a162aa20be06658010cb6e200cd0792f2d5c7eed281569d20395fcf0dab05c51b559515e4b4bf9bc0bfc6ecec1583

/data/data/com.shengdianxia.pushmya/files/event.txt

MD5 ea2a07ae03abfe8251b21cced3b6db02
SHA1 b275636b7e271aa40951119df82cdd66a3b386a4
SHA256 d88fb0eddd8ac9a259defe9b34376851ffc0a617c3175c1e61625a39e3b2db25
SHA512 037737efcd659db8b35dc261759e862fc2df1afbeeed99ac48900358021feefbcd50e90f26fd1b6c3a6439b2126a3f39ba25f36d2efe2734a876fe0d68344150