Malware Analysis Report

2024-09-09 15:58

Sample ID 240614-mq9ras1bpn
Target a93ebac5e7a5c956282fd7f56fc5cd5b_JaffaCakes118
SHA256 e7ea0099127f04bc8a8ae8f9cef89e5413106a9069addfb1be23b51b12d2e870
Tags
discovery persistence collection credential_access impact
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e7ea0099127f04bc8a8ae8f9cef89e5413106a9069addfb1be23b51b12d2e870

Threat Level: Shows suspicious behavior

The file a93ebac5e7a5c956282fd7f56fc5cd5b_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence collection credential_access impact

Obtains sensitive information copied to the device clipboard

Requests dangerous framework permissions

Queries information about active data network

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 10:41

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 10:41

Reported

2024-06-14 10:44

Platform

android-x86-arm-20240611.1-en

Max time kernel

26s

Max time network

138s

Command Line

com.redape.taxiherouser

Signatures

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.redape.taxiherouser

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 maps.googleapis.com udp
GB 142.250.200.42:443 maps.googleapis.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.213.8:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 172.217.169.10:443 tcp

Files

/data/data/com.redape.taxiherouser/files/gaClientId

MD5 c252c3be6c865d3a98754a72dca288ee
SHA1 776749daad27daa287226374f40d6d0183b89b49
SHA256 6c32cc56900aa21c14b8f3b183a7e4d415beeff32d92c0f587f5aa747e4f3790
SHA512 a270c78fe71ba1b3e23a8825fad344fec3d545dbde4c9972c2ca42e647b7400c69527b2689fc0901ef6b8da446b090711eaf85f9c43ce33eb8cf3e47791d1e93

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 10:41

Reported

2024-06-14 10:44

Platform

android-x64-20240611.1-en

Max time kernel

50s

Max time network

177s

Command Line

com.redape.taxiherouser

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.redape.taxiherouser

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 maps.googleapis.com udp
GB 142.250.187.202:443 maps.googleapis.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 142.250.179.226:443 tcp
GB 142.250.187.234:443 maps.googleapis.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.200.46:443 tcp

Files

/data/data/com.redape.taxiherouser/files/gaClientId

MD5 e8e1fa5d2a61bcc731d78b5638e35038
SHA1 79911c0e842e4af94f7b4ea3c4fd5ba518ca5392
SHA256 89da3ea505816b42ed25965440a1b6b6a867f7e18b44800ef5c301e984dbea0e
SHA512 fb510e0cbb17bba0fefeabf35b3c803713e50bd25af836338e7ed07fb1375fcf2bb4a7b4d98e0cc39cb8523bd3e152b72ca489d50374db3ed0004c8f6242b9a0

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 10:41

Reported

2024-06-14 10:44

Platform

android-x64-arm64-20240611.1-en

Max time kernel

158s

Max time network

135s

Command Line

com.redape.taxiherouser

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.redape.taxiherouser

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 maps.googleapis.com udp
GB 142.250.179.234:443 maps.googleapis.com tcp
SG 119.81.43.27:3000 tcp
GB 172.217.16.238:80 www.google-analytics.com tcp
SG 119.81.43.27:3000 tcp
US 1.1.1.1:53 maps.gstatic.com udp
GB 142.250.187.195:443 maps.gstatic.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ad-x.co.uk udp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp

Files

/data/user/0/com.redape.taxiherouser/files/gaClientId

MD5 90468ab896b576e46cd3c1272fc7fac4
SHA1 4d117eceb121c3dbc05297d2a580af27c77b2b0b
SHA256 eb0da62aec2311e6bc7868e13439c58b2138e34d8d24979d0b667424d65e0cb9
SHA512 e052919621cb8875bdc8648fe062c7154ea8b126762383edd9057ee8ddec04b0acbf35d50c50c5f5eb9adab3d2e9110c06be259374a8e1376739f8c3b43dbb26