Malware Analysis Report

2024-09-09 17:34

Sample ID 240613-ph4lesybrf
Target a58139a0ac84b9b8028a13e4ab401363_JaffaCakes118
SHA256 ebc75b8f00b7237dabf4d2e89af1de7f1c405bf65086ec5b9cf358d2c24d4773
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

ebc75b8f00b7237dabf4d2e89af1de7f1c405bf65086ec5b9cf358d2c24d4773

Threat Level: Shows suspicious behavior

The file a58139a0ac84b9b8028a13e4ab401363_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 12:20

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 12:20

Reported

2024-06-13 12:23

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

131s

Command Line

com.andbase.huliandai

Signatures

N/A

Processes

com.andbase.huliandai

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

/data/data/com.andbase.huliandai/files/libjiagu.so

MD5 bda4ff85b15d4d478129b0f4b4d44387
SHA1 8bfd4de45a34275bf37700b58355d7a7a56a2729
SHA256 0c3770ec0d7284160716b1167c957198319913f02fa3913807d03139da6c7dc6
SHA512 a922ec196cf60eb832ce16b98b039bc7d675db952de7fc496c0fd08c29f83d9809a5db1d59e2dd45760ae54dd3a079905c71d425a540cf7f1649bc4e5e2eeb74

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 12:20

Reported

2024-06-13 12:20

Platform

android-33-x64-arm64-20240611.1-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
BE 173.194.76.188:5228 tcp
GB 172.217.16.228:443 tcp
GB 216.58.201.106:443 tcp
N/A 224.0.0.251:5353 udp
GB 172.217.169.36:443 udp
GB 172.217.169.36:443 tcp
GB 216.58.212.234:443 udp

Files

N/A