Malware Analysis Report

2024-09-09 17:32

Sample ID 240613-pfb4dssdlp
Target a57cb3166c2a7ef277c2979568b43cb6_JaffaCakes118
SHA256 2d71cb974a3de33bfe3de4b69b6cc63122490e5eb5db101c3220ef3ce39a5ef8
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

2d71cb974a3de33bfe3de4b69b6cc63122490e5eb5db101c3220ef3ce39a5ef8

Threat Level: Shows suspicious behavior

The file a57cb3166c2a7ef277c2979568b43cb6_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 12:15

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 12:15

Reported

2024-06-13 12:19

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

140s

Command Line

com.themascoteers.swiperoo

Signatures

N/A

Processes

com.themascoteers.swiperoo

Network

Country Destination Domain Proto
GB 216.58.204.67:443 tcp
GB 142.250.178.10:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

/data/data/com.themascoteers.swiperoo/files/libjiagu.so

MD5 f9739465c6b39a3f13b36745f1b25957
SHA1 84e9ce739289c646ef454e50b66a96e9002c548c
SHA256 4b1f93b85c03c0f338990e2e259824ff7f62804f0b573e1be50a4a781f3e0f19
SHA512 ee52a81d051be8ca1a6c7b10e867a1e6b40d3db274ac18df4802eae6fc702eed189a8c72ccf98959f3b4543bd07262483a8e5d8d64d75f0657627eb38e41f381

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 12:15

Reported

2024-06-13 12:16

Platform

android-x86-arm-20240611.1-en

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 12:15

Reported

2024-06-13 12:16

Platform

android-x64-20240611.1-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 12:15

Reported

2024-06-13 12:16

Platform

android-x64-arm64-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A