Malware Analysis Report

2024-10-19 13:26

Sample ID 240614-hrs3qayhpa
Target a86cd5868f56dc0ea1c7884adc81b818_JaffaCakes118
SHA256 49cabd80ba8ea90818ab88f8d5d289c5e3693b6f9bbf7b51324f138dec66034b
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

49cabd80ba8ea90818ab88f8d5d289c5e3693b6f9bbf7b51324f138dec66034b

Threat Level: Shows suspicious behavior

The file a86cd5868f56dc0ea1c7884adc81b818_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 06:58

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 06:58

Reported

2024-06-14 07:01

Platform

android-x86-arm-20240611.1-en

Max time kernel

3s

Max time network

160s

Command Line

com.sctek.merchant

Signatures

N/A

Processes

com.sctek.merchant

chmod 755 /data/user/0/com.sctek.merchant/.jiagu/libjiagu.so

/system/bin/dex2oat --instruction-set=x86 --dex-file=/data/data/com.sctek.merchant/.jiagu/classes.dex --dex-file=/data/data/com.sctek.merchant/.jiagu/classes2.dex --oat-file=/data/data/com.sctek.merchant/.jiagu/classes.oat --inline-depth-limit=0 --compiler-filter=speed

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

/data/data/com.sctek.merchant/.jiagu/libjiagu.so

MD5 350725f563f224eafc5105c95e122ae0
SHA1 39bfbebc17cc2e68de75858f3e6a7e591de5c587
SHA256 2f23bbae04cb5c6dea52e9c02762a5872c3999796a2fd127a7b77374cc37e936
SHA512 592cf1b26694b1da203e27496ffb5da498c025b4c9bc174bc6c2dd17aa65bd63bc2ed76952237cfad4c60c527bb285631d1988fcb2a0aa179c7bf2c5dd68f852

/data/data/com.sctek.merchant/.jiagu/classes.dex

MD5 a57e817c9c3ae2f7a54130ee23a4f581
SHA1 ada13a329bb2cab4b9018da8cb4515355dc75980
SHA256 e78e817bbdf9b87f4a9a048e1053df6233f912bcd993ac3bbc583fbb6607de31
SHA512 67521f09e711b590c629110a01bcf3d9b2f4acc9ff69f5afa89f68d70a9d83d82687dfdf4e4627a09b44e52b2e882ddef15bae474f865e42636cedec49af6ec1

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 06:58

Reported

2024-06-14 06:58

Platform

android-33-x64-arm64-20240611.1-en

Max time network

8s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 172.217.169.68:443 udp
GB 172.217.169.68:443 udp
BE 142.250.110.188:5228 tcp
GB 172.217.16.228:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.234:443 udp
GB 216.58.212.234:443 tcp

Files

N/A