Analysis Overview
SHA256
93e9538d02c22b12ab4d8b1422096cd4908ae3e007859a739cec357d683f0935
Threat Level: Shows suspicious behavior
The file a559f3edd744241554561378ba1d261f_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Requests dangerous framework permissions
Queries the unique device ID (IMEI, MEID, IMSI)
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 11:42
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:45
Platform
android-x86-arm-20240611.1-en
Max time kernel
87s
Max time network
138s
Command Line
Signatures
Processes
com.TeaM.Avatar
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.212.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
Files
/data/data/com.TeaM.Avatar/files/ShowName
| MD5 | 7319468847d7b1aee40dbf5dd963c999 |
| SHA1 | 7722745105e9e02e8f1aaf17f7b3aac5c56cd805 |
| SHA256 | b0f66adc83641586656866813fd9dd0b8ebb63796075661ba45d1aa8089e1d44 |
| SHA512 | c11d53b386f5ee0c042c9246d4a38b1e032a3bc9ea3f6827a9482d4f31b6e4a1973c97190bdc59d961d5b6f1d5b06c25c4b9e94ca04eaef395a928fa851493d6 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:45
Platform
android-x64-20240611.1-en
Max time kernel
88s
Max time network
148s
Command Line
Signatures
Queries the unique device ID (IMEI, MEID, IMSI)
Processes
com.TeaM.Avatar
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.212.200:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
| GB | 142.250.200.14:443 | tcp | |
| GB | 172.217.169.66:443 | tcp | |
| GB | 216.58.201.100:443 | tcp | |
| GB | 216.58.201.100:443 | tcp | |
| GB | 216.58.204.78:443 | tcp |
Files
/data/data/com.TeaM.Avatar/files/ShowName
| MD5 | 7319468847d7b1aee40dbf5dd963c999 |
| SHA1 | 7722745105e9e02e8f1aaf17f7b3aac5c56cd805 |
| SHA256 | b0f66adc83641586656866813fd9dd0b8ebb63796075661ba45d1aa8089e1d44 |
| SHA512 | c11d53b386f5ee0c042c9246d4a38b1e032a3bc9ea3f6827a9482d4f31b6e4a1973c97190bdc59d961d5b6f1d5b06c25c4b9e94ca04eaef395a928fa851493d6 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:45
Platform
android-x64-arm64-20240611.1-en
Max time kernel
140s
Max time network
132s
Command Line
Signatures
Processes
com.TeaM.Avatar
Network
| Country | Destination | Domain | Proto |
| GB | 172.217.16.238:443 | tcp | |
| GB | 172.217.16.238:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.16.232:443 | ssl.google-analytics.com | tcp |
| GB | 172.217.169.68:443 | tcp | |
| GB | 172.217.169.68:443 | tcp |
Files
/data/user/0/com.TeaM.Avatar/files/ShowName
| MD5 | 7319468847d7b1aee40dbf5dd963c999 |
| SHA1 | 7722745105e9e02e8f1aaf17f7b3aac5c56cd805 |
| SHA256 | b0f66adc83641586656866813fd9dd0b8ebb63796075661ba45d1aa8089e1d44 |
| SHA512 | c11d53b386f5ee0c042c9246d4a38b1e032a3bc9ea3f6827a9482d4f31b6e4a1973c97190bdc59d961d5b6f1d5b06c25c4b9e94ca04eaef395a928fa851493d6 |