Malware Analysis Report

2024-07-28 14:33

Sample ID 240613-rb33eswdlk
Target a5eb6ea1b23af42a2bf323466b9a0d6e_JaffaCakes118
SHA256 7e54de1812b6c24d70c8afe2b68f5578afa32eed512dee613581c0d4a4629513
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

7e54de1812b6c24d70c8afe2b68f5578afa32eed512dee613581c0d4a4629513

Threat Level: Shows suspicious behavior

The file a5eb6ea1b23af42a2bf323466b9a0d6e_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 14:02

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 14:02

Reported

2024-06-13 14:05

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

159s

Command Line

com.llkyj.kuaiejii

Signatures

N/A

Processes

com.llkyj.kuaiejii

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 216.58.212.202:443 tcp
GB 216.58.212.202:443 tcp

Files

/data/data/com.llkyj.kuaiejii/files/libjiagu.so

MD5 faa973621086d6fb8d1fe86a460db40b
SHA1 ae09cfa2351e7ca98d3acc9d9bf7d0bb17680537
SHA256 6ee081753f582d98d552f6fa41c832fd668fb7634f5719c2bcfeea8d856d58f8
SHA512 9a4728f8826063f927ebf968ceef932eefb3f4920ef92180447b4fa0159fa1657ebd21da4e795e950c9c2d19f7b83ccc5aee0551e288f22cf2ec39d3740f4622

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 14:02

Reported

2024-06-13 14:05

Platform

android-x64-arm64-20240611.1-en

Max time kernel

2s

Max time network

132s

Command Line

com.llkyj.kuaiejii

Signatures

N/A

Processes

com.llkyj.kuaiejii

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/user/0/com.llkyj.kuaiejii/files/libjiagu.so

MD5 faa973621086d6fb8d1fe86a460db40b
SHA1 ae09cfa2351e7ca98d3acc9d9bf7d0bb17680537
SHA256 6ee081753f582d98d552f6fa41c832fd668fb7634f5719c2bcfeea8d856d58f8
SHA512 9a4728f8826063f927ebf968ceef932eefb3f4920ef92180447b4fa0159fa1657ebd21da4e795e950c9c2d19f7b83ccc5aee0551e288f22cf2ec39d3740f4622