Analysis Overview
SHA256
52f7cf7cdc460b08da53e0679c7d3b91c94e1e88ae1c5091772443857ae6c09a
Threat Level: Shows suspicious behavior
The file a56da4cdf02ff57345c9964cca1c3fd4_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks Android system properties for emulator presence.
Checks Qemu related system properties.
Checks known Qemu pipes.
Requests dangerous framework permissions
Checks the presence of a debugger
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 12:01
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 12:01
Reported
2024-06-13 12:04
Platform
android-x64-20240611.1-en
Max time kernel
3s
Max time network
187s
Command Line
Signatures
Checks Android system properties for emulator presence.
| Description | Indicator | Process | Target |
| Accessed system property | key: ro.product.name | N/A | N/A |
| Accessed system property | key: ro.bootloader | N/A | N/A |
| Accessed system property | key: ro.bootmode | N/A | N/A |
| Accessed system property | key: ro.hardware | N/A | N/A |
| Accessed system property | key: ro.product.device | N/A | N/A |
| Accessed system property | key: ro.product.model | N/A | N/A |
Checks Qemu related system properties.
| Description | Indicator | Process | Target |
| Accessed system property | key: ro.kernel.android.qemud | N/A | N/A |
| Accessed system property | key: ro.kernel.qemu.gles | N/A | N/A |
| Accessed system property | key: ro.kernel.qemu | N/A | N/A |
| Accessed system property | key: init.svc.qemud | N/A | N/A |
| Accessed system property | key: init.svc.qemu-props | N/A | N/A |
| Accessed system property | key: qemu.hw.mainkeys | N/A | N/A |
| Accessed system property | key: qemu.sf.fake_camera | N/A | N/A |
Checks known Qemu pipes.
| Description | Indicator | Process | Target |
| N/A | /dev/qemu_pipe | N/A | N/A |
| N/A | /dev/socket/qemud | N/A | N/A |
Checks the presence of a debugger
Processes
com.laihui.chuxing.passenger
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.169.8:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.179.234:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.201.110:443 | android.apis.google.com | tcp |
| GB | 142.250.200.46:443 | tcp | |
| GB | 142.250.179.226:443 | tcp | |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.200.46:443 | tcp |
Files
/data/data/com.laihui.chuxing.passenger/files/libexec.so
| MD5 | 6497fbd127b9b9923f5326a482d5aae0 |
| SHA1 | 4e65893f4a64b79b3e04f9e7ae2b4440b3a8c951 |
| SHA256 | c7c1ec92a44280493c65fb6d6ce7488a6b43f938993583428bb5a8f43427c294 |
| SHA512 | bfe4d2338d82c30e4487230969a28ea12c120f296271f31ef2e0da09734139c12c394293e1d84fa34574f55188bd07bd28c8e896eeaea7653e6878d6f232c2b0 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 12:01
Reported
2024-06-13 12:04
Platform
android-x86-arm-20240611.1-en
Max time kernel
3s
Max time network
159s
Command Line
Signatures
Checks Android system properties for emulator presence.
| Description | Indicator | Process | Target |
| Accessed system property | key: ro.hardware | N/A | N/A |
| Accessed system property | key: ro.product.device | N/A | N/A |
| Accessed system property | key: ro.product.model | N/A | N/A |
| Accessed system property | key: ro.product.name | N/A | N/A |
| Accessed system property | key: ro.bootloader | N/A | N/A |
| Accessed system property | key: ro.bootmode | N/A | N/A |
Checks Qemu related system properties.
| Description | Indicator | Process | Target |
| Accessed system property | key: qemu.sf.fake_camera | N/A | N/A |
| Accessed system property | key: ro.kernel.android.qemud | N/A | N/A |
| Accessed system property | key: ro.kernel.qemu.gles | N/A | N/A |
| Accessed system property | key: ro.kernel.qemu | N/A | N/A |
| Accessed system property | key: init.svc.qemud | N/A | N/A |
| Accessed system property | key: init.svc.qemu-props | N/A | N/A |
| Accessed system property | key: qemu.hw.mainkeys | N/A | N/A |
Checks known Qemu pipes.
| Description | Indicator | Process | Target |
| N/A | /dev/socket/qemud | N/A | N/A |
| N/A | /dev/qemu_pipe | N/A | N/A |
Checks the presence of a debugger
Processes
com.laihui.chuxing.passenger
getprop ro.product.cpu.abi
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.201.110:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.238:443 | android.apis.google.com | tcp |
Files
/data/data/com.laihui.chuxing.passenger/files/libexec.so
| MD5 | 6497fbd127b9b9923f5326a482d5aae0 |
| SHA1 | 4e65893f4a64b79b3e04f9e7ae2b4440b3a8c951 |
| SHA256 | c7c1ec92a44280493c65fb6d6ce7488a6b43f938993583428bb5a8f43427c294 |
| SHA512 | bfe4d2338d82c30e4487230969a28ea12c120f296271f31ef2e0da09734139c12c394293e1d84fa34574f55188bd07bd28c8e896eeaea7653e6878d6f232c2b0 |