Malware Analysis Report

2024-07-28 14:21

Sample ID 240613-pmcy9ssfmr
Target a58702d2bc7d71fde752f668cffcafcf_JaffaCakes118
SHA256 9ef59afbaaf958a36ce60d678702fd0ebdf780391be49b73944f30394e273a5d
Tags
banker discovery evasion impact persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

9ef59afbaaf958a36ce60d678702fd0ebdf780391be49b73944f30394e273a5d

Threat Level: Likely malicious

The file a58702d2bc7d71fde752f668cffcafcf_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker discovery evasion impact persistence

Checks if the Android device is rooted.

Queries information about running processes on the device

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Requests dangerous framework permissions

Queries information about active data network

Queries information about the current Wi-Fi connection

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 12:26

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 12:26

Reported

2024-06-13 12:26

Platform

android-x64-arm64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 12:26

Reported

2024-06-13 12:29

Platform

android-x86-arm-20240611.1-en

Max time kernel

162s

Max time network

186s

Command Line

com.video.newqu

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /system/app/Superuser.apk N/A N/A
N/A /sbin/su N/A N/A
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.video.newqu

com.video.newqu:xinqu_process

cat /sys/class/net/wlan0/address

getprop ro.build.version.emui

getprop ro.build.version.emui

/system/bin/sh -c getprop

getprop

/system/bin/sh -c type su

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 log.umsns.com udp
CN 59.82.29.162:443 log.umsns.com tcp
US 1.1.1.1:53 ksvs.cn-beijing-6.api.ksyun.com udp
CN 59.82.29.162:443 log.umsns.com tcp
US 1.1.1.1:53 f.gm.mob.com udp
US 1.1.1.1:53 s.jpush.cn udp
CN 120.46.131.222:19000 s.jpush.cn udp
US 1.1.1.1:53 sdk.ks-live.com udp
US 1.1.1.1:53 is.snssdk.com udp
US 1.1.1.1:53 update.sdk.jiguang.cn udp
GB 216.58.212.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
CN 120.92.15.230:443 ksvs.cn-beijing-6.api.ksyun.com tcp
CN 120.92.15.230:443 ksvs.cn-beijing-6.api.ksyun.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
US 1.1.1.1:53 sis.jpush.io udp
CN 123.60.92.210:19000 sis.jpush.io udp
US 163.181.154.236:443 is.snssdk.com tcp
US 163.181.154.236:443 is.snssdk.com tcp
US 163.181.154.236:443 is.snssdk.com tcp
US 163.181.154.236:443 is.snssdk.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 app.nq6.com udp
US 1.1.1.1:53 z.tn990.com udp
CN 120.76.202.236:80 app.nq6.com tcp
US 1.1.1.1:53 android.bugly.qq.com udp
US 1.1.1.1:53 easytomessage.com udp
CN 139.159.137.254:19000 easytomessage.com udp
US 1.1.1.1:53 api.exc.mob.com udp
CN 180.188.25.46:80 api.exc.mob.com tcp
CN 180.188.25.46:80 api.exc.mob.com tcp
US 1.1.1.1:53 f.gm.mob.com udp
US 1.1.1.1:53 f.gm.mob.com udp
CN 14.22.7.140:80 android.bugly.qq.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
US 1.1.1.1:53 im64.jpush.cn udp
CN 139.9.119.173:7000 im64.jpush.cn tcp
CN 120.76.202.236:80 app.nq6.com tcp
CN 139.9.119.173:7002 im64.jpush.cn tcp
CN 139.9.119.173:7003 im64.jpush.cn tcp
CN 139.9.119.173:7004 im64.jpush.cn tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 59.82.29.163:443 log.umsns.com tcp
US 1.1.1.1:53 f.gm.mob.com udp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 59.82.29.163:443 log.umsns.com tcp
CN 139.9.119.173:7005 im64.jpush.cn tcp
CN 139.9.119.173:7006 im64.jpush.cn tcp
CN 139.9.119.173:7007 im64.jpush.cn tcp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 139.9.119.173:7008 im64.jpush.cn tcp
US 1.1.1.1:53 f.gm.mob.com udp
US 1.1.1.1:53 f.gm.mob.com udp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 139.9.119.173:7009 im64.jpush.cn tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 119.147.179.152:80 android.bugly.qq.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 139.159.137.254:19000 s.jpush.cn udp
CN 123.60.92.210:19000 easytomessage.com udp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.29.248:443 log.umsns.com tcp
CN 59.82.29.248:443 log.umsns.com tcp
US 1.1.1.1:53 f.gm.mob.com udp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 139.9.119.173:7000 im64.jpush.cn tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 139.9.119.173:7002 im64.jpush.cn tcp
CN 139.9.119.173:7003 im64.jpush.cn tcp
CN 14.22.7.199:80 android.bugly.qq.com tcp
CN 139.9.119.173:7004 im64.jpush.cn tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 139.9.119.173:7005 im64.jpush.cn tcp
CN 139.9.119.173:7006 im64.jpush.cn tcp
CN 139.9.119.173:7007 im64.jpush.cn tcp
US 1.1.1.1:53 f.gm.mob.com udp
US 1.1.1.1:53 f.gm.mob.com udp
US 1.1.1.1:53 alog.umengcloud.com udp
CN 223.109.148.177:80 alog.umengcloud.com tcp
CN 59.82.60.44:443 log.umsns.com tcp
CN 139.9.119.173:7008 im64.jpush.cn tcp
CN 59.82.60.44:443 log.umsns.com tcp
CN 139.9.119.173:7009 im64.jpush.cn tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 180.188.25.47:80 f.gm.mob.com tcp
CN 223.109.148.130:80 alog.umengcloud.com tcp
CN 139.159.137.254:19000 s.jpush.cn udp
CN 123.60.92.210:19000 easytomessage.com udp
CN 223.109.148.178:80 alog.umengcloud.com tcp
CN 223.109.148.141:80 alog.umengcloud.com tcp
CN 59.82.31.154:443 log.umsns.com tcp
US 1.1.1.1:53 im64.jpush.cn udp
CN 124.71.183.120:7000 im64.jpush.cn tcp
CN 59.82.31.154:443 log.umsns.com tcp
CN 124.71.183.120:7002 im64.jpush.cn tcp
CN 124.71.183.120:7003 im64.jpush.cn tcp
CN 124.71.183.120:7004 im64.jpush.cn tcp
CN 223.109.148.179:80 alog.umengcloud.com tcp
CN 124.71.183.120:7005 im64.jpush.cn tcp
CN 124.71.183.120:7006 im64.jpush.cn tcp
US 1.1.1.1:53 android.bugly.qq.com udp
CN 14.22.7.199:80 android.bugly.qq.com tcp
CN 124.71.183.120:7007 im64.jpush.cn tcp
CN 223.109.148.176:80 alog.umengcloud.com tcp
CN 124.71.183.120:7008 im64.jpush.cn tcp
CN 124.71.183.120:7009 im64.jpush.cn tcp
CN 59.82.112.112:443 log.umsns.com tcp
CN 59.82.112.112:443 log.umsns.com tcp
CN 139.159.137.254:19000 s.jpush.cn udp
CN 123.60.92.210:19000 easytomessage.com udp
CN 119.147.179.152:80 android.bugly.qq.com tcp

Files

/storage/emulated/0/com.video.newqu/config/gamechannel.json

MD5 16986fac450d103ce69ef448677da08f
SHA1 4274a9fb272bbf00ff49a1c20472a60d45ea935f
SHA256 f287d8718c8100592684c04c3ca04add986f2ad895848b724e17e9b15bca06b2
SHA512 372c0f41db474626c4fd0833f511c3a860452e018f25c3b5511fe1be947dee616b20d3598cc899d623ca42711e3b8bbe1d1e7300bde0b555b86eefb9195e8b5a

/storage/emulated/0/Mob/comm/.di

MD5 70a42cba408700f9a6c01c7941a8829e
SHA1 eab01cc2c0671538795fb0b1146017dc099d0984
SHA256 499576707ce2623293166979e59c832be5b8636c64ad39aa63ebcf961910c35f
SHA512 8900d4dc8eed0430babbacb72942401bd22ef7fe5430cad90d3ce0c2c53010220d666aa0e2eb1026f3ec81d574c7fa12585b49222a5f15b01637f6ba134fe70c

/storage/emulated/0/Android/data/.mn_410185822

MD5 bb778cfe83f8ef1a9d21d9d7c2ff45e6
SHA1 ce998124c8c1dd21b09039d0be35023a6e226c1e
SHA256 79061c0db4be352ef088eab7bb77cb57218faa20d589dea70ea2fe9d8b094b29
SHA512 ea07726c39182cb9d7fcbcf060353f52bae78786f592d33cdd85615e124bcf79f478632942f5ce4e7ebed553ced3869ce99138b482fa18c4435f01f9c19281a6

/storage/emulated/0/.mn_410185822

MD5 f64aeeba14668afe7e47454f76657715
SHA1 bb9f11c479684db4bf903745849633d3ea72043c
SHA256 bac7bf768d80cbf9deeeed770f1b77c0426069457ede1fdfd69322524acb2a8e
SHA512 1b1229a8b3422705e3ef705fb84685c77dbf18178a99b48bc67830b3b6e852756f01e4e90ecf2be4bcf7e17aaa5f912e4d0ce660e722981e5d9f973bf411470b

/data/data/com.video.newqu/databases/xinqu_data.db-journal

MD5 32830e94ab736e7de7003b7d3e1b3b5a
SHA1 2ea6317f57b968bfbe61583944bda693ba7f8b1a
SHA256 627fe3b2cc7c544f7f56e3b489ce455151bbb24f52eef68f96c139c47295a4c2
SHA512 15b452f2ba0c7ccb8b533e1bd1f2a01f3e8ef678ff73871093d8bb42992280562958794a501fa90f954d54488bcd37dcd8c9151ef8af1b382a9a892fac84299c

/data/data/com.video.newqu/databases/xinqu_data.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.video.newqu/databases/xinqu_data.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.video.newqu/databases/xinqu_data.db-wal

MD5 db790e8efc5727a29b86b4f0f0892554
SHA1 0979057186b93936c83b3bdf99cab554183bfcf3
SHA256 958cab18017cc30289c66abd4c6667a7f68e2370e222668a9c6be4435a158d11
SHA512 5b086ece5d4925a36b77349a82a2f6f2de3a58b4edc34aa5684a6d46bf954e174fd11c9dd81230dbf156bc38f2c7ceb4f28d1219be334f8a77c491f14f5f3d40

/storage/emulated/0/Mob/.mcw

MD5 63e265c0a595d77cc19f1c95d5d64ca8
SHA1 56f7507318a8c48197564677802b61de193685e2
SHA256 4da6c75c5f2d40ec26e2edf26962812b58f0d067c59d33f0642bdfff59c1781c
SHA512 2e777eae9c9e8d191c568991e9affe4fe629fb38276e7655a8e0e3d606b75a83b28d24583ddc08fe8277aa82363b80f0b4e4b2d4d8e166f4271f8c2d7c816240

/storage/emulated/0/Android/data/.mn_410185822

MD5 38dbfc1f45811fbda7c9dcf75b6a0a1f
SHA1 53209074f5650dfa6664b1ee00fb1204fd933c26
SHA256 114da08dcd0fa55e3c7c8ebe5acb93b301c03384be9f027d06a6a7c1a9522d24
SHA512 0c10f1378b07d67c191691401aaada9b2cc32de447252175920b01fb223bb4554fd3801a73cb54c9b2ab0018b5211f0faa0f2fdea3fdd3e3e5605b5201656f13

/storage/emulated/0/data/.push_deviceid

MD5 e34573cf77369f76a93239d22b24c6e3
SHA1 c777de13af35bfeaf6a7ceb7b5a4a2957219e7f4
SHA256 945c7e69bdd72b007e7cf5e4adff1e5ae0b456d3b80544faf9593ad27d070ffb
SHA512 31ab03b70090601a36d8f1321f309dd8f30963675be0ff27350002d39f9f10be73dca6a66fb4ffe062025be163358fa88892e3ba9e3175982f1478db3fac0913

/data/data/com.video.newqu/databases/downloader.db-journal

MD5 da71c11396413621f0303522adf95d9a
SHA1 f8668ebdc3722daa0cead9d130aae49b53096301
SHA256 3904f5f737063ffdbc75ccf2d75777aa356c824c4aefc83e7530b3294c70c692
SHA512 070192a6051b02b7a84a8b37e61c506a7775f158144511c66c6452d980daf20bddce0906a1aaaa5c7929a3cb34f1446cad1e89441fcd153ed956bff66fa108ee

/data/data/com.video.newqu/databases/downloader.db-wal

MD5 756314ec8529bf73039b22e45b2ccdb4
SHA1 9ff087d6c30bb3730d7999c619a9372bd588bace
SHA256 cf5d55481ecf4e6888d1a9e56eac25d7f7e577b38b2516b940727564c8e253a5
SHA512 26aa68c33a44ac121da9d4539b5efe989a83ae351bcd1a86ca4b65673f83de55ff6c55137c6c1fbee8e858d687217b6a8dad37f9bb32465dddd3083927786c0c

/data/data/com.video.newqu/files/jpush_stat_cache.json

MD5 079095078563fca95fbb5cfb630020b9
SHA1 3da0fb5adf0d4dfc910f4299ac91d8d18c3f1e7c
SHA256 a7c7d1ce9f49460923cb658112b342b0eb887263304a7fa30fd933727ab062e9
SHA512 3da0dad4c77e355124d39c6ab3ed54cfb6f3cf36f3b40afc86253437664f97d3a32c82f57ad96b8caf738bad4b3890f0a8a70932fc6b2e6976be6eb483c57148

/data/data/com.video.newqu/databases/bugly_db_-journal

MD5 d044a06556e3161c5395ac475e413f23
SHA1 912b082bb03b41588c005401a23a4cfe94be6407
SHA256 dfa81725b362446d7f22d56ec527b81d9f7bbbdc81a1fb2216979d9698bdee12
SHA512 3f5523ef3cde399560e2c060a13c3c320abf1ce7a82d736706e5f494fe82f4a5dfdb72e3589ab112f52a878ed8389cd4a1739ee27269ecc0321dff5a335e01dd

/data/data/com.video.newqu/databases/bugly_db_-wal

MD5 031fe9558088fe2bc8cdd58557e8217e
SHA1 57fb4cb3cb7eca1482df9bfb25ff9c5ca039bfb2
SHA256 0c3adc810c045d2f87ff5a0221242a31348a97e8145adf308b62e9c172b745e2
SHA512 50ff749331069d479cf6e162e247b41691ab55b5fffea7d4b8acf2306e4287dd763ec5c05233b872ed95adf492b583c86af94df1cb07db614a01e324020fb485

/data/data/com.video.newqu/app_crashrecord/1004

MD5 6425729cd41550fc778733567203c29c
SHA1 d93fd7e306b0a12dc07c58cb8510287480495d7c
SHA256 9d693a40b9414e096cc8af55802d1d1dc23688bbb16605c5b70a18f88ef94ce6
SHA512 e6e95d79e6c7154d9c983e1766345487b529b07d67404795b77e6635f3f641477a1ff73aca2eda4d46cbf4867cb808f3ed1bcd4f6c84d39898ed80e802fbf03b

/data/data/com.video.newqu/app_crashrecord/1004

MD5 0d210bfb2a0e1f1b4c082a6a0f79de07
SHA1 bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256 988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512 536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1

/data/data/com.video.newqu/app_crashrecord/1002

MD5 dfc471add0cb83028e36d0e256621ae3
SHA1 7c251840ee955bfb8db309368d26aa570602cd81
SHA256 0ddb1523629413711ca330f30c5141588ac1dae7e1f1d10fc17ba034295718fa
SHA512 19431c0f1ca1443b30c534b3980bbb975e115ce9fb2f3214d224557418ab004d3dee60bb38a3e8a603c7570424503f93ce43540e960cd78c12fa41e3f8fd7f89

/data/data/com.video.newqu/files/Mob/mob_commons_1

MD5 99914b932bd37a50b983c5e7c90ae93b
SHA1 bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA256 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA512 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

/storage/emulated/0/Android/data/.mn_410185822

MD5 6f19fbb63b3311f7868c1850172674f7
SHA1 9e2a7c71cb8ef254dfba3188f94c36fc60d3d884
SHA256 47741ab6f7c6478692f2a3ab14c7166d5ad33cd763c0b8d2bd9bec69dcf15ab8
SHA512 f47d9dac8386f1240e0907f207c1b5c774613345decf5a35b4285626aa61d37c011107e5242cc73e5c66228f65adea994875058259c754574049afc47333da07

/storage/emulated/0/Mob/comm/dbs/.duid

MD5 556474609706583a56c27739025c0079
SHA1 9876ea8d1fa14694148e2fef32c920e5c98d4ea0
SHA256 d1b5a2d6f5a23a6ed030ffad120a91fc684afed55aaac668cc48e6f237be4c38
SHA512 90a146b73f3570208f181dfd3f2212e559b8fd922a0020e5b18079d11afcce648100cf2b5f8290d7ed12e62f9fba3feaa22a73ef22c34553020f707610e87bea

/data/data/com.video.newqu/databases/cc/cc.db-journal

MD5 2fd5407350b9c30fa450c0fb3669e678
SHA1 5eebbfd9c0aa2bd99bf8f9d862b05c5c7f3d29ff
SHA256 3aa59f39391b7997e369b33bd24d03105de98b74ef1b79abfd499acc35ecea3b
SHA512 f621108b1f0c387addff48efbd78209eeee7769b9c5ca048f584b7ca984e494aad8e7e54304745114ca6f5179e37c531ea52428238b34d87c607a82fa08fd9a0

/data/data/com.video.newqu/databases/cc/cc.db

MD5 5d7ea1a23af19b4340cc8d90f28297d5
SHA1 4cfe95b23a9e98378d69c4290af81b51fbe76aea
SHA256 474c4a54534ed96beacad7cc9a805a3f53ec9c0522fc7bcc59771cf500a6a0da
SHA512 33071f4c92da0a3df01c4a61dd165df7c7e0f4f37753cafe02d19fc876a5e7fcbb01c069c804e140ab8bfa0644a55f50fd1373646d1c439f817baa5ffbd47f7b

/data/data/com.video.newqu/databases/cc/cc.db-wal

MD5 7e4f9fe1ad83c36cbe718bcffca9d4df
SHA1 56c7d81dc7de7c0d9ca9383544a62351d491f62b
SHA256 e1d791392de6b045fb64c9d9758fb20092afd3e3a2af93596f56039fd13342ba
SHA512 5ce7b2babe54bc695c3ec9cdb7398e52fe45cf84fbfa121eb7f0c9e383f1e194236c251392c806d5560920d3dd21e627ebaeb6d26365d3ae6e2a223710b74b21

/data/data/com.video.newqu/databases/.ua/ua.db-journal

MD5 1177642b0514f9fa021642bec840baa0
SHA1 84ac6ee32d14af28fb9bc283cfc5b78413eb5d6a
SHA256 12524ef9ea086a485a94e836978d6b96c675217bf6be721a032662c91d14a545
SHA512 b8b48daa6017e2915230a02c4e814214b54b3a2037797e946ea573cd88624657e9cc2e2cae204c33afa09a6b0dd63d8b610569853269e9b0c143072802a07354

/data/data/com.video.newqu/databases/.ua/ua.db

MD5 3278a529a8757940872d0674f65d282a
SHA1 fcbcd8066bf37923b2cfb857b959e1f9e7653f52
SHA256 fe5ccf50e313fb20014000c1acb7bcf54aaf7b5390984fb969f179bd34b8e6ee
SHA512 8719faabed29b6c94de130e3dbcd6426232eae957998df8f6a57464f7f4445a30124c507134e7ac9d2ad6201d26f23985126f6954c1c36a6b8da784bfb6f0178

/data/data/com.video.newqu/databases/.ua/ua.db-wal

MD5 e90398fe1e92d1067767133137a8b011
SHA1 f7733bb5841b3ceac6210aea2aa64884f6adc981
SHA256 1b4a86913c4605de6365fa85910331249b442b915c7cc201f4a05d38341e269f
SHA512 88db73d0512b72cc59a09a088dd0050b2485b1902450562a324bc7970f09c5bf71c44358d64c16e4dda832fa15bbc84de868306f569b206e689a8ba2792cb8c8

/data/data/com.video.newqu/files/jpush_stat_cache.json

MD5 503cb5e10f1fa20993b400f87e75c90d
SHA1 f207266bdacb724efcf3df9c4146948fcc78f3de
SHA256 8b059283457a2016c5df1318ff9a9d1a11684a07a1c39963f4a7dc3c39172db1
SHA512 cc4c21cf9b41c2248f04ad9ea15c637144b5f411ca80d233b00e1dffd7ffdb88b71f8b1471cf2ae76a87a2ad9f7e8daddbf37b7db94d7dbebc3d1ddfc1dc8f8f

/data/data/com.video.newqu/databases/.ua/ua.db-wal

MD5 5932463f85af19941cd60be8a02327a8
SHA1 402329214c9c0ea0bcd380723e070916b0911d19
SHA256 d009820e4e1283ba541336abc831e97d6e455e59ade1eeed1e34f5879c36c431
SHA512 b5cac355110bd16f4323b34cefe09b6e3b1f683f291da9eb3ecefe3a10f715446e0283b3f4619d4c6d1c005d5623993c430f0c6e9ab802fa29ad0952ef5aa99f

/data/data/com.video.newqu/databases/.ua/ua.db

MD5 dc0db69031064668d410cb2becfd03da
SHA1 f635485ffecceceb6ddf493acd06b467868491a2
SHA256 c5314aaa5c79d452160ecd625ca577ca8ece9f6a9f83205b4d8c2d62eeb732aa
SHA512 00c56031fbc19eeab99b75c70cbc0fea286e253bc6538cab58e4906c76883aa0a4497210bffd1dd51f7032a50bfa2c5d4ddc9147d59b53dff44a5442322d7a16

/storage/emulated/0/.UTSystemConfig/Global/Alvin2.xml

MD5 9781ca003f10f8d0c9c1945b63fdca7f
SHA1 4156cf5dc8d71dbab734d25e5e1598b37a5456f4
SHA256 3325d2a819fdd8062c2cdc48a09b995c9b012915bcdf88b1cf9742a7f057c793
SHA512 25a9877e274e0e9df29811825bd4f680fa0bf0ae6219527e4f1dcd17d0995d28b2926192d961a06ee5bef2eed73b3f38ec4ffdd0a1cda7ff2a10dc5711ffdf03

/storage/emulated/0/.UTSystemConfig/Global/Alvin2.xml

MD5 2dad1d35cf35fef8780650b5c5fb5f24
SHA1 e4098a07a8e1244feb03ed83daff4099db608c40
SHA256 b5e58db3ba1cf88f1247a5a99fe0c0ed731cbb5acb6179c77fbf98e2293f7ac8
SHA512 e1023edacc06121c9c620f5f1be08077817fcadfaa7cd102f9fcc157225fb420180562d8b07ab529573b337688bf0164561b85ecbe07b83b167f4de01d2908b6

/storage/emulated/0/.DataStorage/ContextData.xml

MD5 7bb7a585896ff44d913a854ec4dc75ce
SHA1 efc16099b0bb39912f6c275fb6a41b9ae12a9b7f
SHA256 ec83e6a1a8a7ed5f6fd45a368b60f358dfe9b0155d658eaae1aac3802385adce
SHA512 7b688eb438aa7a6848f269eb06908a44b16161c7746cf26731bcef68409568acfad18d4b45bc3c4e1290098209a84a965ae7a5867a955f499ab90cc4eb635b3d

/storage/emulated/0/.UTSystemConfig/Global/Alvin2.xml

MD5 77d10a701869e9c4432861596ba83893
SHA1 f79f01af3fb641aae25d6863dcb993559663edc9
SHA256 d9baec0268bcbefa0b195b0025ccbb2e3e79238e91f627312495bea9b19bd8bb
SHA512 c05d4e6cc150d8a1b0c8a7a0469def132f4863dad1be021f132c00855d1f01e6592f038ceb5ddb68047976d831f80906b1c6d9706cacf02a1be0ad113fd888f6

/data/data/com.video.newqu/databases/ThrowalbeLog.db-journal

MD5 35a5c23abc827ab911298d419746163c
SHA1 c04ce4d9a1c96cb56a9d23708f491059517e0ad2
SHA256 1a0d42575f888ed956faf845c56b1c82de4f85a9fc17971f7e2c5d09afae75f6
SHA512 6875aeb48f15bffdac1d171ad36353b057f83eba1c711d11b7bcc9a28c681dff070424fb3b51431832f73b5e238621264066fc89217bb7d37010163746619a22

/data/data/com.video.newqu/databases/ThrowalbeLog.db-wal

MD5 8dc536a16b43cdb3f4925ddee8d54e25
SHA1 d35464da76e0a7019427235e4accdbcea7b52051
SHA256 04d1e49f9dd799aa6e417c6422c58de8662f48b1eae54b2645e9b862842b5077
SHA512 021d7f97519b2aa1597c982ef4b4e46b08372d9d958f41d15d6a0518ee56c514291cb72efbb9ae161cf725843c643eba6896151269aeeb646058d8f91e5dfc26

/data/data/com.video.newqu/files/umeng_it.cache

MD5 aa631ec477d3090edb7754917e942811
SHA1 3efb7c68832d6b100dc0e1880fa6b54f62ee1e75
SHA256 8fc944d79b73eace0eb1b697dc9a6c6e4f50217193daa124a975116b51d7aa34
SHA512 91cbb166b3a6315f8b5db1132014ce35fd2267cb099409ecb1523548eddb863f8ab09c9d83267e13e1851156b6f6232e6a91f01d153b7821d36f8efe9b6ba9a5

/data/data/com.video.newqu/files/.umeng/exchangeIdentity.json

MD5 9e3707ee5afb8d5d13ad8c173c567da0
SHA1 96f2570083464fe3010f896a50c3612f8b86af85
SHA256 8a99c65a6b33bb28a2c2f3eb5bc817fecdc551433fc40f1bea017ad0466ae228
SHA512 0074b2ec79993ac3f5dd05bc070eec81f5725136fbc62eb74bcf418eec0636478d713e610ff10a27fd2183552332d14f3e7cd20f52295518a5dc64bc5b89e1c3

/data/data/com.video.newqu/files/exid.dat

MD5 b2c039b6bca3e85d5ef2552fbf9a88c9
SHA1 e954e6dab198c83a104d191d362a057fab659477
SHA256 7d0f658303f055d9c970ed382284af4692b2250dd5fc0df945a00dcd380944fc
SHA512 72833818b5c526dd5d5407fbbed8fc14be862ef4d99675f34d0a4731fbfc9fd3b14911bee2ccfec3f3512417febea1b8f718cccb61feeb4717b54d72879f3660

/data/data/com.video.newqu/files/jpush_stat_cache.json

MD5 e5a07a129714128cfd5f1255f607ee22
SHA1 e4ff50bac43d3b1e52c34b1fb48617d1c12b8478
SHA256 102a6a4197de540f5bb3fff479813999d2f52fcb45926e3ee3986e30ddd300ab
SHA512 b52869a6806761bd670c1f3951894eac15b3e8df8a7488ae2a08c61676d1fb3b9a713fd838c88c0599ea642a6f00a9f28cf1a559f53c9cdb4de1055240eda394

/data/data/com.video.newqu/databases/.ua/ua.db-wal

MD5 5a213d7510fb94e767b5b64a6c434fcf
SHA1 1573d4aacfd93839310b70146970097c55d4cee8
SHA256 274a5b72d01033d89eefbd95ea9bb38df856ba104153715b88ca935b1ced3828
SHA512 4f7687a873294d389f8624d631a1e809524cb034ccf4fbe1bbe49016a4dc9f9a8a9964f4e007d2a01cf4b6db77771520604e919df7a4879250ca7472d1c5d113

/data/data/com.video.newqu/databases/.ua/ua.db

MD5 d604a3bf1f8d992cc320ea5b1f7609bd
SHA1 247f88df0b55c7d523ea5398637711a0e4a483a4
SHA256 329940b4d46326d58e73c842dd099704061d0ef7338777bf31ad895f29013c17
SHA512 67e28f6713cb5c238a9664df128f01a89a2efb7c8c9330c1e45bc0d40ebab81fa20df5166743d84d81dc0386a89ff0329f022281c098339baa2e851ff0a1e1ab

/data/data/com.video.newqu/databases/cc/cc.db-wal

MD5 b47df5d8c49b56551f23f309425cc9c2
SHA1 7b15f97d23c97f7d03e609ed392b22c1dc6cbe01
SHA256 0f493d8d902205d7cfc7bfc8d9b71ee296c896a2fb990b17a2e758e358f5edb5
SHA512 3b45ae687405a50d108310ce2e9cdf0e75769bab805b22f7fb018074f35f8a29105bb09b9e7716652427ea6e37d22ed9fa4daa8b6349875fe0451d3cc834d722

/data/data/com.video.newqu/databases/cc/cc.db

MD5 ce6135aa1b1fe4f2c2db2a546d2a5558
SHA1 79b59582154017aadab783dc266fcb158c252940
SHA256 7b45f576c08c7f78220168cca4a0e33198b13e9bdc8b1da406ddb6887412000c
SHA512 2839075fe374c8567c839ae35ce2d33ec72fdaebf170aa7d224b555e5b0e74d4a43f2f67d17ed806dae841da883e9620d788ea052d06152678afa927307c7ce4

/data/data/com.video.newqu/files/.um/um_cache_1718281762230.env

MD5 aced3a40c78a80833625d788e34db2e9
SHA1 939ba9dcd6aa376965441bf7b19b485c1f7bbf18
SHA256 96d346a04362c6786b3c3c0ce3f2cdb5122234da2ff074519907a90699208a59
SHA512 a204b56d1031850b34dbd67c2fa74030f7f66c3d8483a9d4d1c69ab40bd5e3b7b8e5cfab9a9a02dbd205c55e17ba258fc40cf3e5e65dd346b60d0efde8fcc74a

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 12:26

Reported

2024-06-13 12:26

Platform

android-x86-arm-20240611.1-en

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 12:26

Reported

2024-06-13 12:26

Platform

android-x64-20240611.1-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A