Analysis Overview
SHA256
2be36ac2c04ff406fb2e81a978ef15799877d01fc590e86fc0968fa143c66760
Threat Level: Likely malicious
The file a55a0de96eff9689c510337f76c2b2bf_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Checks if the Android device is rooted.
Queries information about running processes on the device
Requests dangerous framework permissions
Queries information about the current Wi-Fi connection
Reads information about phone network operator.
Queries information about active data network
Queries the mobile country code (MCC)
Registers a broadcast receiver at runtime (usually for listening for system events)
Uses Crypto APIs (Might try to encrypt user data)
Checks memory information
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 11:42
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to request installing packages. | android.permission.REQUEST_INSTALL_PACKAGES | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. | android.permission.PROCESS_OUTGOING_CALLS | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:46
Platform
android-x86-arm-20240611.1-en
Max time kernel
179s
Max time network
184s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /system/app/Superuser.apk | N/A | N/A |
| N/A | /system/app/Superuser.apk | N/A | N/A |
| N/A | /system/app/Superuser.apk | N/A | N/A |
Queries information about running processes on the device
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Reads information about phone network operator.
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
| File opened for read | /proc/meminfo | N/A | N/A |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.wjwl.lipsticka
com.wjwl.lipsticka:ipc
io.rong.push
/system/bin/sh -c getprop
/system/bin/sh -c getprop
getprop
getprop
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.204.74:443 | tcp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | stats.cn.ronghub.com | udp |
| GB | 8.208.8.123:443 | stats.cn.ronghub.com | tcp |
| US | 1.1.1.1:53 | cfg.imtt.qq.com | udp |
| HK | 43.135.106.117:443 | cfg.imtt.qq.com | tcp |
| HK | 43.135.106.117:443 | cfg.imtt.qq.com | tcp |
| HK | 43.135.106.117:443 | cfg.imtt.qq.com | tcp |
| US | 1.1.1.1:53 | update.sdk.jiguang.cn | udp |
| US | 1.1.1.1:53 | s.jpush.cn | udp |
| CN | 119.3.253.130:19000 | s.jpush.cn | udp |
| US | 1.1.1.1:53 | api.weixin.qq.com | udp |
| HK | 43.129.2.204:443 | api.weixin.qq.com | tcp |
| US | 1.1.1.1:53 | log.tbs.qq.com | udp |
| HK | 129.226.107.80:443 | log.tbs.qq.com | tcp |
| HK | 129.226.107.80:443 | log.tbs.qq.com | tcp |
| HK | 129.226.107.80:443 | log.tbs.qq.com | tcp |
| US | 1.1.1.1:53 | android.bugly.qq.com | udp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| US | 1.1.1.1:53 | nav.cn.ronghub.com | udp |
| HK | 43.135.106.117:443 | cfg.imtt.qq.com | tcp |
| GB | 8.208.102.120:80 | nav.cn.ronghub.com | tcp |
| US | 1.1.1.1:53 | open.weixin.qq.com | udp |
| HK | 203.205.239.154:80 | open.weixin.qq.com | tcp |
| CN | 60.205.180.247:8000 | tcp | |
| US | 1.1.1.1:53 | sis.jpush.io | udp |
| CN | 1.92.70.140:19000 | sis.jpush.io | udp |
| US | 1.1.1.1:53 | long.open.weixin.qq.com | udp |
| CN | 109.244.216.15:443 | long.open.weixin.qq.com | tcp |
| GB | 216.58.201.110:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | easytomessage.com | udp |
| CN | 123.60.89.60:19000 | easytomessage.com | udp |
| CN | 60.205.180.247:8000 | tcp | |
| US | 1.1.1.1:53 | _psis._udp.jpush.cn | tcp |
| CN | 120.46.141.4:19000 | udp | |
| CN | 121.36.15.222:19000 | udp | |
| CN | 123.60.79.150:19000 | udp | |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| CN | 124.70.159.59:19000 | udp | |
| US | 1.1.1.1:53 | tcp | |
| US | 1.1.1.1:53 | im64.jpush.cn | udp |
| CN | 139.9.135.156:7003 | im64.jpush.cn | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| US | 1.1.1.1:53 | android.bugly.qq.com | udp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| CN | 109.244.217.35:443 | long.open.weixin.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 1.94.137.47:7003 | im64.jpush.cn | tcp |
Files
/data/data/com.wjwl.lipsticka/cache/image/journal.tmp
| MD5 | cb46ae335198e10191311eec4345db00 |
| SHA1 | 3df8cef54f3251c2179546c1109d177e7a5e17d9 |
| SHA256 | eb1c44b3ff7c5c756e792ec964d3afeb64ac5b81af842864e658eb6c066f7392 |
| SHA512 | 542e93dde1f64daf1fde3cdaa77b1fc8bcb00b613ed8acec35d201daf8447acf4a8a6161132eb65b74201e7f0f9ce964704c646fa397f91716a61334226e8f87 |
/storage/emulated/0/Android/data/com.wjwl.lipsticka/cache/ronglog/RongLog_2_8_27.log
| MD5 | 90e68b2cec9bad90bba270dcbb4d118a |
| SHA1 | 66e5511bd60c4f127ce50255486a4cd14b61bd3b |
| SHA256 | 6ab3e6f09b16d2b2efbac963c6b77e5f91fba8a2bc3e70b98c3e38c5abeb1b4b |
| SHA512 | b550e6c225054659da27dc76c9acdc9bf082e2faef642f4976603b1a9c345c1a19c5902bf8f0c2a5375e7cb624ec64aa53e3dedc4fb9bb8a6752016dfb755ea6 |
/storage/emulated/0/Android/data/com.wjwl.lipsticka/files/tbslog/tbslog.txt
| MD5 | eb64ee5ffac58519ae9915a658598669 |
| SHA1 | 1d92cac8832415dc5bac1d09ff5c474ac4887a3c |
| SHA256 | a837b01fb418878f3b0f6fcacd58a642b2e27c2a403bd9afd6fd58627436b041 |
| SHA512 | f036e9b1c4a931a7af2e3a357239406f47eb55ca9c2158c44008288115ae740f699b87be0406b7256c1bb7a28f793b8512e9a23a0054fdb7cfca869b782adb8b |
/data/data/com.wjwl.lipsticka/app_crashrecord/1004
| MD5 | f1814a8ed875f90c97601ccc670dfeda |
| SHA1 | a8c6191a87440922c8d5749e6d0a00e3e7582529 |
| SHA256 | 19f82d63e1b74c7484756c5981b247a7ed8e4ff60b732f3e60a9bb24f9a09517 |
| SHA512 | 0882dd37fb2541941daa0815056ad2b8cd296ccaf8d6a5baf720c5ebc765e22eab1cfc33ba6114e57809e6986721371b8c54066338161169c5276a98dbedbb00 |
/data/data/com.wjwl.lipsticka/databases/bugly_db_-journal
| MD5 | 34a4cd83b1952d55607137e8465df4e7 |
| SHA1 | f3fe9f1dd9ce159ea9a92053d0900b0658f9a393 |
| SHA256 | 120ec4bc21e2c2e98ad9850846697938e1f3805d55bbad532a7adc6f7053eefc |
| SHA512 | a80797402ba08435acf508b1f4044f2372f2e03f78ac14bfd19219aa7494a5ea575d8db1ff68f481a0fc021fde3a3f8de863ee6ed5deb6a824c2f4a3a2b77af4 |
/data/data/com.wjwl.lipsticka/databases/bugly_db_
| MD5 | 3bd7114ea95ae5d1ce480f0fe91750da |
| SHA1 | 3e4ed7d60346d6800564492b220c9e187cc99d42 |
| SHA256 | ff4e26f00087b5d1e48abc275e27b3324fde43eea41d55c7513c6d3ada29ac4f |
| SHA512 | 8d44c53454aadae20c3d7b70a2de4c1a88f4fc210b2b4958742a6f799550edf1224f86b4a6761ffebe7caf99a5160b3d97edeffe7ec320d3a0c27525afa978bd |
/data/data/com.wjwl.lipsticka/databases/bugly_db_-shm
| MD5 | 474c676f49060917b5d2501f661c1a2e |
| SHA1 | 61369827eb711573007affc9b208f30771817cbd |
| SHA256 | 2f8f4312f190c27338aa3ffa3e907a75b59cb14f935271a660522a5ce2828033 |
| SHA512 | 4815e9bed3bbc32b1f9c02334af39487fc8f06ba9605ceb44b1adbe00cb13dd528313de9a440d8b31999caf902d0214edc779456e438e98d6e304c93818d2ba1 |
/data/data/com.wjwl.lipsticka/databases/bugly_db_-wal
| MD5 | d07ca99b9f1c5389daddb58cca4d2869 |
| SHA1 | 4a4393a820143a79fb13c5361ed889b22e85c65c |
| SHA256 | ea33397135b08e19a269bc5ad56bcb4281f4bd9984e6e83043ff29972bf0e714 |
| SHA512 | 3575039a66341410451a9962c188501230346fa033540f6831b3bf219eb19d3d634612f922039cbed4abab557d355bd133b1a3fa12aa25b3632c87b02e361bc7 |
/data/data/com.wjwl.lipsticka/app_crashrecord/1004
| MD5 | 0d210bfb2a0e1f1b4c082a6a0f79de07 |
| SHA1 | bb8ed9e364db79d1d9f2fcde3f15091893222faa |
| SHA256 | 988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d |
| SHA512 | 536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1 |
/data/data/com.wjwl.lipsticka/app_crashrecord/1002
| MD5 | 01b77206036192d6ee4d6945b70db637 |
| SHA1 | fbbaa940c822f450be086d54b8918ee6bd998cac |
| SHA256 | c8c06af77c2a3b251901c9dbe8d02c52c70259d01037de6b25d4ad42cb57b5ba |
| SHA512 | 8db4b124e836bc2d7183b374d20ca0224e3745a388e56e08fa630ecb46f225d5c093c41faa3f4fc41d66f7532ead411c61d17414d149a7a9e1d373870fbcd272 |
/data/data/com.wjwl.lipsticka/app_crashrecord/1002
| MD5 | 17f69e9a4db2a55e4eb4643f4702c186 |
| SHA1 | bad9f1d828a5189e14f1f65a49fb19619e800cbf |
| SHA256 | 965bdd330c0aeda651a43a2ff8ba98282983250001dfcc50e94bce4591b7d7b7 |
| SHA512 | 237086a210b6ab93b755918a71f61c139927e15ac34f44a5b9c3d946c6d0172af5f5a4f64c0eafc48d1fd514d284f8aed5e4899776e7192a7492eb48abdcf1f1 |
/data/data/com.wjwl.lipsticka/app_crashrecord/1002
| MD5 | 78e9bc4ac786c145f1f06bd4cb018494 |
| SHA1 | 275f0329fc6f8bc38a0bc6dfc433f18510788e78 |
| SHA256 | 9113d172cae99a40df973ee85a8ee86d41c42369c9c8376efcb37596fd6f5a19 |
| SHA512 | 52398955102332f0ba64ff6de26350a39d958735d0067740339d88647ba17f1941ff7006240e61f75bf21a33dcfc4f646cf9cb9946bd9fa46a7317a7216fc2d5 |
/storage/emulated/0/data/.push_deviceid
| MD5 | f8c7061b7348078e17f576b19ac09ee5 |
| SHA1 | c5169e4a8bccb312bd15d082cbf2091623a89ef5 |
| SHA256 | c715eb90f4c867efe5b374579ab2a5701cac15a27836a619de6428793ec644ba |
| SHA512 | 0c26827e2b40590206de36bd2b56265fdd039f8b38630b9c1efe75b904c7bc34f91cbb6ecae871c3b07be0b84b718951c49eba37a508737935e9bbfc829f8a7f |
/data/data/com.wjwl.lipsticka/app_lib/x86/push_daemon
| MD5 | ed4f17dc95b32c106489dcca43053619 |
| SHA1 | 94f6bfb3172c7d038c79590d9f70b80fd57b6ef3 |
| SHA256 | a87325322479545fb44e9247bb04543d7787e8d388bb3610c81fd1cfe2d8f365 |
| SHA512 | acd20ae13bbb97cec412a7b9f3288756689e7692c9275c366c3cd4298b955a727fb9e234a1f4e889b7de06548a743f43c0b5f6aa644a80ab994b0b9a2cf63345 |
/data/data/com.wjwl.lipsticka/files/jpush_stat_cache.json
| MD5 | 3bec4396d6eba1eeed6d1eee94c034f6 |
| SHA1 | 8d7f2d03c2e01d12be0e7c95c819573453f578a1 |
| SHA256 | c74303cf649b98230de233d311bb0cfe3728c41bf6cf6cb1423f537880921fe1 |
| SHA512 | 79355fb688ec9ac54a6b10e7b71b6d11cbaaa478fdaccf2f1430234ef5f767bf4c4d3d7f2b1ac10697038088ee758b9ac8dd61eb415ea2bdd6f5ecafe2bd7388 |
/storage/emulated/0/Android/data/com.wjwl.lipsticka/cache/ronglog/RongLog_2_8_27.log
| MD5 | 4f8a55cb04c7d0250338e277ee40c2e1 |
| SHA1 | 31d657b514d58b2d3fa8449888414a521056873c |
| SHA256 | 74f21ff770ecb4d5910dcf4ccd06b9c2644f42fa942afb57a8be9cca10657488 |
| SHA512 | 1e9c3a37cc6c38084408cd7955d1db29f11d81330cce5e3e9add703a4e81ca68ff46fcf9684fd8ff39e7f44475b9929f4a5708c9f6bd610f3fb2465dec14f8ad |
/storage/emulated/0/Android/data/com.wjwl.lipsticka/cache/ronglog/RongLog_2_8_27.log
| MD5 | c010ea9bae49f7482ac73bd97da2effd |
| SHA1 | 96d11179c8f90cc42c04d9cb5b5b4c9c4b2a596a |
| SHA256 | 717b40801c27e089c436c80068cb4c2ac5a36892b7ea68bcf90fb38764ac32cf |
| SHA512 | d6f67d41eb5195b4c90c321c8aea47799832780eb1c42d5494526795b1d8f00d23d352ea12a7716339f64e574f095d22adc29f9ce841426ddcf97d3e3ba2b817 |
/storage/emulated/0/tencent/MicroMsg/oauth_qrcode.png
| MD5 | fb7ba074c39ca6faae8a48730a6892aa |
| SHA1 | 29681e799ff6a1d39a8881d2fc353bb1be3a5291 |
| SHA256 | a6dfdbbcc86b7d4cbf8737e6d310fcb3dda1ce53269559ded1aca9f22ab96b6e |
| SHA512 | 68cc6883995489a3156152745ee3a68d75c2bcc166a70b197e4f34e31448fee9811aecc18bea9253118345c205e79a724406f553bca423c7acb6f2089c3feceb |