Malware Analysis Report

2024-07-28 11:35

Sample ID 240614-dg8cfawgnq
Target a7c83d22ac36f99f3902303ab4620704_JaffaCakes118
SHA256 8ca74dd641e225165e5cfe400c5556a6037e4f8c3a4b9a6681100703d0bde23a
Tags
banker discovery evasion impact persistence stealth trojan collection credential_access
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

8ca74dd641e225165e5cfe400c5556a6037e4f8c3a4b9a6681100703d0bde23a

Threat Level: Likely malicious

The file a7c83d22ac36f99f3902303ab4620704_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker discovery evasion impact persistence stealth trojan collection credential_access

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Obtains sensitive information copied to the device clipboard

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries the mobile country code (MCC)

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Queries the unique device ID (IMEI, MEID, IMSI)

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 02:59

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 02:59

Reported

2024-06-14 03:03

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

140s

Command Line

com.bjin.gamemaster_main

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.bjin.gamemaster_main

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 api.ymkeyxeghj.rocks udp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.206:443 android.apis.google.com tcp
US 1.1.1.1:53 api.zuisimpleweather.com udp
US 13.248.169.48:80 api.zuisimpleweather.com tcp

Files

/data/data/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 9aaea567e0c93e51718ba7eade0e83df
SHA1 0005116aad1779361b70093db00fed5ac090ae23
SHA256 b30a95dff6f65f444472971c8aaf895ffc8e66e0117ce242ec4cb8a8a519a5ec
SHA512 2aef1034335d8752f4e25ce6c5823ce03019536cc6e51ee61b5291c77a0f356a2517e0cbe7f2c4cc2d897115dc856449a342cfdc247c9d34d313187d15b2f890

/data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 f72c3d07507c3e26d317e9117ba757d1
SHA1 cdede4739e9dd9fd95243aab5e44c24f93f825c3
SHA256 1c65834d9ca018c6496a8b9957589d0e94657911b6635dc21a448d78f9238887
SHA512 3420714252e7503abc13c99274d767b0bc08671d769460dc61823ab9470e145fb75c5dfaadc617d3a05cf251ed5ecf38ea7e8c1d7b343bca4d7e8296f1b805d4

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 1be837ce1427ab2420b67ab85de78185
SHA1 898ff90fe6dab4867fb03ddfb793a42b068282f0
SHA256 fcdf1ac1a037d8d0361333f0c5fe4affeb7611f9d60d71bfe6cdaad1004bbe1e
SHA512 eb8bacacf6e05a8c6452eb7a074f372cafcf557cde6247130da9a2d3fe31cdd4b8c590d524effd36956cd1249b12b93bc86b4120de3e0a2272d20dd6a78468ab

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-wal

MD5 b9351fc1c07d6e3a825427b8728bface
SHA1 46abb9e5d64e0d7daa5eee559d2dd1ac9a7c0d15
SHA256 0f3166d6c3c7ecf0adbf1c61317f1e61aea7633b23775bfcc4d321e8182f97ed
SHA512 a6e7dd1777822e710da57264427adc36ec659a46fb7c4e6fac67f9383abdbe15d10be14bca7629b495afe133efc2ecd88e1df65f1dc7329880dedc26a1f26183

/data/data/com.bjin.gamemaster_main/app_ttmp/oat/t.jar.cur.prof

MD5 7f49d2d47e94358e6542b94cd90b5b0e
SHA1 229437778989179a2ec43ebee9335da3386fcd9e
SHA256 63716a2312d74f5b567eada7d5704a693d5b8832822a6b51f493825f1c7db56a
SHA512 fe4588e61571e76e88bc9d63db03df3406730db260729df1a75f89cbac71202d9cd764eec6fd3d3986eecc6201ef52382404f07f30bee4cc1ef1f98237246f5d

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 02:59

Reported

2024-06-14 03:03

Platform

android-x64-20240611.1-en

Max time kernel

179s

Max time network

153s

Command Line

com.bjin.gamemaster_main

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.bjin.gamemaster_main

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 api.ymkeyxeghj.rocks udp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
US 1.1.1.1:53 api.zuisimpleweather.com udp
US 13.248.169.48:80 api.zuisimpleweather.com tcp
GB 216.58.212.238:443 tcp
GB 142.250.200.2:443 tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp

Files

/data/data/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 9aaea567e0c93e51718ba7eade0e83df
SHA1 0005116aad1779361b70093db00fed5ac090ae23
SHA256 b30a95dff6f65f444472971c8aaf895ffc8e66e0117ce242ec4cb8a8a519a5ec
SHA512 2aef1034335d8752f4e25ce6c5823ce03019536cc6e51ee61b5291c77a0f356a2517e0cbe7f2c4cc2d897115dc856449a342cfdc247c9d34d313187d15b2f890

/data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 f72c3d07507c3e26d317e9117ba757d1
SHA1 cdede4739e9dd9fd95243aab5e44c24f93f825c3
SHA256 1c65834d9ca018c6496a8b9957589d0e94657911b6635dc21a448d78f9238887
SHA512 3420714252e7503abc13c99274d767b0bc08671d769460dc61823ab9470e145fb75c5dfaadc617d3a05cf251ed5ecf38ea7e8c1d7b343bca4d7e8296f1b805d4

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 d617c33d53f13c7a4422e8a7182b17ff
SHA1 8aa1b8b67456d3481182cdd79c7e270771c6017a
SHA256 1e7ba29bbffb59ce4253d775ed4d3b5b073d0834e16da7300c8781d001096c9c
SHA512 4a78a66f0577b30083c8c0b6506af5074b628e220ec13cbcf5f6abcd024c3441ffc4fd958fb748cc67471b3f25024d3fa290ee9a8d95a2170a77fcd7a6b97b91

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb

MD5 b41401fa7f54e7d7bbf4f8f8ac002e38
SHA1 5f0f7722831d7aed2bb89a5fb58c25f7d8e46ca9
SHA256 dfa278db4620794953d4d2dbdb39560e41d430bdd6108dc237b9a2f751777567
SHA512 2810844a47bb26a64a440d95bbe95a61136eb238154f82eb0e5f68508026cdb289e05b7b25bc7b0a2d5077c1b52961912cc24d55bf29b303577e7098cc0fb032

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 2e58eb56ae90c264691a05edfa23f804
SHA1 7bf22d61dca2553e983d3a69769f29037300aaf1
SHA256 6b17802cfb05248c808db2b4be57e329aa776a61fa9dc258b665a0868cc5b7d1
SHA512 1c925979ad11cf31bfe7316220febf229bc37b1160b0969841656818ab6665152613ba51348a7576a762d9c3ebd31790c77563156ff5db7f9b634e097eb1368c

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 c38f15d2a87d6f48019667b718ad9619
SHA1 2e3b82a2df9baf05cbf86ae673ecc9c819291487
SHA256 fe2286ca7e8db0a86b80fcbd64bc9e87baa268bae4b070958764ad937625dd4a
SHA512 6b3aae70405325071f889dd0b7177c0920a6316c5764d09af233ef9540fbc148901ef2209280a10f0b7dddba4a3593ee67153e312105ba4019d10131c9b45aa3

/data/data/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 d04d250fb726476e656ea3a2c1a5b93f
SHA1 fbc733a43cd4ba8c361d39f4aa3c058c431fa1c4
SHA256 5f9197ac46643996e7c83944ce04df2e8e04b5766133e70c4ebadd7be6cd857f
SHA512 3890aa76cde5b9cd9790f17548803dab4e281876322704230f5918bd941519b4534b67592da0195e9d78b88b4ea7b1641336eb133f0a19701cfb77e34493d8fb

/data/data/com.bjin.gamemaster_main/app_ttmp/oat/t.jar.cur.prof

MD5 483bd630641b50146dd116b5eff62f0e
SHA1 365f45da142e96fece36a43a02e3cee8359fd0ee
SHA256 610fd316fb0923b8347e9a9f1c78a0cceff927ef5b54d21250728f5ae3d0d616
SHA512 9abdff8ad9a9193abb7b51db0be7bdb3c95cb6c120c4cf0bde2e4b0293c78aa6aec01a2b0fb83327ab78c15dffcbb882e4eed57788ecceb11be779793bd87d43

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 02:59

Reported

2024-06-14 03:03

Platform

android-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

132s

Command Line

com.bjin.gamemaster_main

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.bjin.gamemaster_main

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 api.ymkeyxeghj.rocks udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
US 1.1.1.1:53 api.zuisimpleweather.com udp
US 13.248.169.48:80 api.zuisimpleweather.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 9aaea567e0c93e51718ba7eade0e83df
SHA1 0005116aad1779361b70093db00fed5ac090ae23
SHA256 b30a95dff6f65f444472971c8aaf895ffc8e66e0117ce242ec4cb8a8a519a5ec
SHA512 2aef1034335d8752f4e25ce6c5823ce03019536cc6e51ee61b5291c77a0f356a2517e0cbe7f2c4cc2d897115dc856449a342cfdc247c9d34d313187d15b2f890

/data/user/0/com.bjin.gamemaster_main/app_ttmp/t.jar

MD5 f72c3d07507c3e26d317e9117ba757d1
SHA1 cdede4739e9dd9fd95243aab5e44c24f93f825c3
SHA256 1c65834d9ca018c6496a8b9957589d0e94657911b6635dc21a448d78f9238887
SHA512 3420714252e7503abc13c99274d767b0bc08671d769460dc61823ab9470e145fb75c5dfaadc617d3a05cf251ed5ecf38ea7e8c1d7b343bca4d7e8296f1b805d4

/data/user/0/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 87b5f2e4a791cf6911fab6f7ed904385
SHA1 b0b61208fd1678ff3a7a22e8d9a89a975e0fd237
SHA256 841433cef654824b347f0cec530185959172fd1524260f59b0ee915ad9c77580
SHA512 37813aae53143f2fb543ae037ecba29f9f840b2d4acbaa937f4bb375f905af0a291d7c0d00e58a4fdb9981d1fbe227da9c46faab07ab80e87d9dbd94a76a7e04

/data/user/0/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb

MD5 feb39705b1b862f34e987fd763dfac61
SHA1 4bdc437a1df9b1c4f133737e8ca6af6256bf71af
SHA256 a6fa8979ccfdb51db2d076c90a8df87c26504b4b1be274a4b2bbafe7e04959ca
SHA512 512a230dd3327cb0e04585a09dda368516464cc4e69a63b6cf13221efefbf198501e243df2fd4a134beda0df555baeb4e962fa2163922a14a87c9523625c39a8

/data/user/0/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 eab7cdfa74e775bf13af81c1ee40342a
SHA1 603ffe918b92aaeca3b39b334ce1339c0cfb01bc
SHA256 07c37f4386ca7e6c0003d249b8f9c973537b01e8e12d2328ac06af638e2772c9
SHA512 693a4c0c3e71bbad9957934fc891c4c5c2752fae4c51a02e36af122f6774401da0c3ee6e188a81826c28d086246de34e617cae5d8dc4fa25244082bbcc27738c

/data/user/0/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 68528093078c719be22387b33ee31ddc
SHA1 ed9fe8737f2baec8af260368f5c1f829d33e8266
SHA256 40aa6d88671b9c01607d4959c218e185571380398fd0df9ad3a80be50e3fe01a
SHA512 6b1a18f640d2978769aef25f390e61c786d279e49fc8a7ea5727a98c5cf04ce2e41f44a8b086eed1c92c255b51c74982de9ab10cd62a16684b3147cfc437363b

/data/user/0/com.bjin.gamemaster_main/databases/com.bjin.gamemaster_mainb-journal

MD5 a254d128d9a064bc4de1736579adf62c
SHA1 17b512882fce21e4d0988b16cd906228ba224777
SHA256 ae6d165b34e7bb2fc4b2f8706880589fcc1fe5d2f496d0256efddb8d2512a107
SHA512 af3a7cab4efa3581bf1fc240e5f7abc0a1d723f1590580e11cdba6a53cd2208b496c86c366f8387c6c783c3904e85d07286c66cc5836ceef9b1c4d87aff7f72b