Malware Analysis Report

2024-07-28 11:34

Sample ID 240615-w63glavapq
Target afcaa344d9409237786f2fc800b09733_JaffaCakes118
SHA256 7f9662785c10c4d97f0c67c8f7361cb0b8d61865c40837b6abe6d447e352d10a
Tags
banker collection discovery evasion persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

7f9662785c10c4d97f0c67c8f7361cb0b8d61865c40837b6abe6d447e352d10a

Threat Level: Likely malicious

The file afcaa344d9409237786f2fc800b09733_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion persistence stealth trojan

Removes its main activity from the application launcher

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Loads dropped Dex/Jar

Queries information about running processes on the device

Queries account information for other applications stored on the device

Queries information about active data network

Requests dangerous framework permissions

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Queries the unique device ID (IMEI, MEID, IMSI)

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 18:32

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 18:32

Reported

2024-06-15 18:39

Platform

android-x86-arm-20240611.1-en

Max time kernel

178s

Max time network

179s

Command Line

com.eexs.tnzw.vjcd

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.eexs.tnzw.vjcd

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.eexs.tnzw.vjcd/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&

com.eexs.tnzw.vjcd:daemon

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.73:80 ip.taobao.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.73:80 ip.taobao.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 59.82.121.73:80 ip.taobao.com tcp
GB 216.58.212.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
CN 59.82.121.73:80 ip.taobao.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.121.73:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.73:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.121.73:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp

Files

/data/data/com.eexs.tnzw.vjcd/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.eexs.tnzw.vjcd/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar

MD5 9b47e78a6ff90cce5755ce4742047627
SHA1 831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA256 30d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA512 4587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 11fd08a219d36485ebd70d3d6ee36a1e
SHA1 9ee1b64073cce0cb9fb0cf513edf9f9cd3829438
SHA256 4f5775b6f3448d9838f9f4610e35c50d2d25180842b40ed93772a0a8b72d2d80
SHA512 afa21638b0cb8b7546a72d4120772b476f8522cd4487c11d6e66141a407e584a06a8017966fe448680ee3e3ea5146d4aa67ba9197a62ac3ea081ea8e32db085b

/data/data/com.eexs.tnzw.vjcd/databases/lezzd

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-wal

MD5 46d1a06ae5ff379abfb4e26551c4ddfd
SHA1 9eb140ae4660843d06d9921f4abd4af7dcbce087
SHA256 8b6a576842bff6c9bde0257bcafcfc0429010ba433698e81d0cd385c57e8903c
SHA512 83f959e201453b72b165ff09de50b254aa84240d843eda498e8e20fa12ec8dd81ec3e9c8843ade5b0332a1a8f8cec9a9b47bdeb58e8f3363a20e3327a9aa630a

/data/data/com.eexs.tnzw.vjcd/files/umeng_it.cache

MD5 79518cc9f22b08d32f879d811c3d5b90
SHA1 b633eb4281e4dbf1a80d90863268b3fe3f965ae5
SHA256 c872d79c69e8174bbf48a497335d4d31689566d50964389c7ddd4a0125df8dfa
SHA512 dbba3c51003eec73b9e607b7e1503428bb393375be9f31cc532ec0cedb3a20a0242dc6f997fed188e5c5be11a448da923149a94b92e2fb97eca0d9de1d0c47ed

/data/data/com.eexs.tnzw.vjcd/files/.umeng/exchangeIdentity.json

MD5 90cd4cfe11fcad8b335abb288aad2af6
SHA1 23b914b395337efc85e339ef7c3bbd28a23ec117
SHA256 c7dc4b1cfdbe825009c84a7220609c44875d88791a9687b40cf51152afa1cb29
SHA512 80104d8cba2ac336a046d89a2d67d57913ded380e29ee2ebbe654bf9302fe41cbc5177a7f54d10fc8f69c05cc40911b0beb7f46d1563836eb3b46ef6459c0c90

/data/data/com.eexs.tnzw.vjcd/files/.um/um_cache_1718476728432.env

MD5 f694ac12935a664bcf8649596d296b72
SHA1 9fe1b75ec9dea6a2aad905b518f0811713ab10ae
SHA256 2d3d667375056751c1d4c047f845628e5910cfdac8ed736ac1539e1e7d259485
SHA512 ad83bcf4b2da0f7027c4dfb2aeefc92cf752e0141564ccc12e770da87c6d69f4d9fda7b91d4ced3239a58c643e52e6ce18f37c0f6b880f8999eefdb19bec8354

/data/data/com.eexs.tnzw.vjcd/app_mjf/oat/dz.jar.cur.prof

MD5 0ccc8aaf29a1a4ec7d93eeb450a132db
SHA1 120e4d20608814d7c262d42a52855231b32c3062
SHA256 2293104bf25e6df3058df7c799eb680ea457effe5d2715207a80ed3c84133ea5
SHA512 9864072171f7b399b2aa9f7f7d0f05ca49cc84c9183dded7a77f935af4b255894c48345ad0cb0607d34fc6e80b96964a0ece2096466d2a73a18bd1fc0a2c3453

/data/data/com.eexs.tnzw.vjcd/files/mobclick_agent_cached_com.eexs.tnzw.vjcd1

MD5 071f9c8ab79fd7a2d9e3a7d4baaae1f0
SHA1 f72a31d1c860c592512cc8529aba365a4dbc50b3
SHA256 3c81a75ec2362e194cf0fab9ca06aed5e1ff56d1257b6b85d837434cb0188f08
SHA512 5b1187424347d2ccb69f8c6075cceecd36427efd80e80bb9185bfe4a414a83bf4559ec8be61a4bdf87f88a15dba5842fa9ea54a57ca3c7e267ca6b64a1074cba

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 18:32

Reported

2024-06-15 18:40

Platform

android-x64-20240611.1-en

Max time kernel

178s

Max time network

183s

Command Line

com.eexs.tnzw.vjcd

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.eexs.tnzw.vjcd

com.eexs.tnzw.vjcd:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.127:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 172.217.169.46:443 tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.127:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.234:443 semanticlocation-pa.googleapis.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
GB 172.217.16.226:443 tcp
GB 142.250.178.14:443 tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.120.12:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.120.12:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.120.12:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp

Files

/data/data/com.eexs.tnzw.vjcd/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.eexs.tnzw.vjcd/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 f3b5e1d840a413fec0f91e9203e52b05
SHA1 888295acb0e447ec9ab1034ef2a1ea8029ce9bc4
SHA256 b453d75b542f50862ca45ce814cd7231182ea18e15c69837b97bf1ba2caff85a
SHA512 65eb9ba0b30af43bccd78671ef81912199c2e24927dce2654f8ab867197e82818a61b6a531ee791b4bb36bb80dcd126689eeb5e8adea5d3ac66b0914bdd68239

/data/data/com.eexs.tnzw.vjcd/databases/lezzd

MD5 dae68dcffc3d522a79f98ebbc3b6d457
SHA1 6df5dce9a50f12044a2d20b8d1742ae47b82ee03
SHA256 56cf91ca198812e0ef9ba4af0e96c08a32e24c917bcf2250bdebdfd7fd6f5286
SHA512 23b76f988399e9c9e4f5a7e8d19ecb765abdb115b0beee35f8ca9d221bbc5ee79f0152fac4261cc91eb9e7f874b5c6e9bff2dbb1812d31412d506cf83c16adcd

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 e3c58d8c8761bb336d4cb1dc4e08cbc6
SHA1 a9790219c3bdf1cf2742a3b8aa1cedd608731693
SHA256 b53f9023f9835fd1a5cb50c100a12fbf62dfbe9222ff999577cecf3bc87eef37
SHA512 1b6f2759eba6636c3f5c65b6f55cbc1f9e856d364737c6ae4e723df1268e857d801f211c56f94c6d3e363e9fa08c84e7816e76e9a24ef1dbf46c447b49e82379

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 66556dbd61d404f1da0e74b2bde0e0e9
SHA1 113c9581c0ab7e2fa862b864fa54c27f8d36eca9
SHA256 98e6f4f3155aa2297a37f0dd12148e8772d7a8219a554bc0ee4037f634549586
SHA512 5d66433b51efb32f3b3ee214dcc21d45049f9ff61c17ad11f2a8ae4b3b9d429e5261d9cfb0d5c437c96da369b943edb77d9da3f0ea6ad29e7f318daf40e51db4

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 2e50dd35723de13bdaec75d1da5ce6ef
SHA1 daf9201f951ec2e5361568dec41ebb7cdebbb8b1
SHA256 1d600d8b552e0f2b99a8f1385bfa931dca7fd7da1b2114baedbdc625aa53f922
SHA512 ee7c1821d1957b0f8d4014fc20d9e18761ae84c1a5c0ff7981a85dd684147a5fa82e24e43fcd7075f0cf12ec2069021c2c8d61b12fcbc6f003b7c8122276c11c

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 0a2d2531071b707869968ace5222dc41
SHA1 27240fd300651cbe2ad3a7f7221a5547cc1c406b
SHA256 7f154e5c63a82ba018009aefa2df518707268358f7ecc37d5f86ca4b42946cac
SHA512 8bb061c3580f686640129b65b070e090c0b213890daf3fbbb9e647a84406229af1b1fdf65e10090b6465e3626dd7af81fce9912f44e93e8b7504b6ecea8bc198

/data/data/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 ae6cb8c90f08b150de76398254d26a40
SHA1 16ba9932e7ff3166ae2acdb009687a6be2ce6bec
SHA256 160e7b6c978c49a202704a2ab43dab7433224e727ce5a6bac623cd6b46837073
SHA512 570d75658ffa97e1c37b62a952c1d963fc82dd1d4b7ab548abcbae6a4e69bc17dbc5a4d25c7a6e19139f4bd701a70f45e91a5c02ad6806d756436f49ff7dd9dd

/data/data/com.eexs.tnzw.vjcd/files/umeng_it.cache

MD5 50f474265de70e429bfd08855e072e0a
SHA1 359ddebf6d1a139708fd8af0964cda741a3ff165
SHA256 c986e63c5032a4241667fb2876a43ab80ae3efebaac531faf1a8981c3c8fef9d
SHA512 c442c3497b5101ffa420d7a5accb584cd9e061eafbd40ab3a5cab6615cdfcd3f75ada8446ba7068ee5b5e807ec0cf2544f8ca6cc9e8bdbc76adc6c23b25f5353

/data/data/com.eexs.tnzw.vjcd/files/.umeng/exchangeIdentity.json

MD5 5b5c2fb62955ba66ca20130fdf170167
SHA1 68230145dbce054fde82898b6623045b564c8ea7
SHA256 96b38d4b19222d9a46e82dab29e4649b7e17ee509a4a5663bdbb4f8d846f1762
SHA512 e11aa61b2d4332cae56f563d64f759a43c07008bdc1def6c176fc883840066eb128dfd7b2dbc0c699b7db70b81fec93debf170367f6c4b6d1ab096a8a0d5c6dd

/data/data/com.eexs.tnzw.vjcd/app_mjf/oat/dz.jar.cur.prof

MD5 ad834ed210ff5f8191af408a1d5c9650
SHA1 c283217496d5e8f97888c820ceb0eb94c6dd91c1
SHA256 60699d90ae79e5e51e080e48d80fe2b659b746d708a1f47d8dbd21ab30bcbca2
SHA512 9e73b4ff5b957b839a1519e51341ec2b92009636522b65ecc464120b3abd12663d463a904689716be5792671a1def6a898e89c155166fd2c2fa57275910eeaf7

/data/data/com.eexs.tnzw.vjcd/files/.um/um_cache_1718476733201.env

MD5 e47f731ab7dda1279590bafb2cc32fa8
SHA1 77513b8f897ed99e289dedae36c465c139770396
SHA256 7821697093f545ac3db7f374f9792b616512ed0394bbf74e3c379c68b36bdb50
SHA512 01db51801f58a84f217d5486a88815e0b363325d6a438efb0c7d2c654c060b40ccc2e0af299fdce28b337b08c339e70124bd9dfa8a71d2d3758cf4808ec201d1

/data/data/com.eexs.tnzw.vjcd/files/mobclick_agent_cached_com.eexs.tnzw.vjcd1

MD5 a1247868fcaed2d7d9456b27bcc4acd9
SHA1 ede6d00a40dfc00e8b3536d7951ce43a8dda0223
SHA256 effc45092540ea66756e0567a6f027bbccaccbf924a74c5fe78a63f087abd1a0
SHA512 c59fb86cbe0ab6aaa43778a68b63d0f029be46d36ca1d29150b8f6a451e0926a08fc43b6402f8749aefcd15f1dff8044b5ece59fdb46c2c7cebb92548e393507

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-15 18:32

Reported

2024-06-15 18:40

Platform

android-x64-arm64-20240611.1-en

Max time kernel

178s

Max time network

184s

Command Line

com.eexs.tnzw.vjcd

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.eexs.tnzw.vjcd

com.eexs.tnzw.vjcd:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.10:443 tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.127:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.127:80 ip.taobao.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.122.127:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.140:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.eexs.tnzw.vjcd/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 83e5eac884916101cc464af6502954cb
SHA1 42e0d11276f2e639471d90b8ecddb8ebd95619dc
SHA256 90c65d45fbe28e1cb9cbc658eb38ae15715defcebcb562a09196d913353657b0
SHA512 941b5a02ed0004d7b5fd82822f415d181afd2cf05cbe87b7bfefb4e0b1f1adad6dbbbf1f3f742a0ed961417eb3f7451b8ded8dc29e3ab4962f6f2155727bf187

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd

MD5 fdb8a92e5060ce104e8f0faca55a47ce
SHA1 270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256 194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512 ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 8920a49945367f9b3ae3493eb2dc1bb7
SHA1 c985ea76ba8f8d3b356938dd217f1605c2a76110
SHA256 71da9eb2616c02f88aae704c4f8e6039db7329179dfd37b45327b3b31b186bcb
SHA512 9799439c402f5d146680f52a1f160b250a6b5dd9aed511464613021a7f92eda49a5e205af97c30940fc8d4b5d9bad17f3d45cec7c4f15a2319b232919d630614

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 5ca17d575e4911325aba3750e213c979
SHA1 3d5273c7e388512fe7b93db3f7504c599219218f
SHA256 51a5ae67bd65071f63e9c257075dba06339e7ba45c4220b747384dca3f93bfaf
SHA512 647fa202fd60bc4e9139c38e478134432ec8e0cb7ebda29364635a274db8cb4675a304932da4c658bc3db52b87917b8d7941cfc4b535456582c55d0321ce9c1a

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 f0dfb04b4f46c3126f1122014191dc64
SHA1 a352f5f53a9ca3a78c1218cadc7d651ec34d70f1
SHA256 ee7913743347ac8f0b53bcb1d63d02f6080fef6203fda5f01449ccad49bad4bc
SHA512 1039b39cda55f9b42408f1e5ed0c72ad7fa8f6bd16b4b9471e7c9982b2ad6b669b72905600395cf48e47d1104c9374f73682a5209c25f3285f76697cf7c5ce6e

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 9f484f760d4743059699d730223720ae
SHA1 b957e1f910199e21b74efb17a64474d4baf99f66
SHA256 90236d54a862b1b550863cae021ef97e4338a343a85277c6071356c59b9886fa
SHA512 88d43f5b4819d4f1370a306bb88b265e32dd1b4275b983b269483cb00e5eac4d95ef7e64a27619b9f6701b099e2015089b3505f38a80c9d5f4c06480e6308de6

/data/user/0/com.eexs.tnzw.vjcd/databases/lezzd-journal

MD5 9f38c2eb0843df8443400b318c2dfcdb
SHA1 b5034a3036bb99f0ad9a7d3e90b01a7da153625d
SHA256 7df44d559d57969784680a90d3f8640cb9f5786a0cc373b1277c38b1c8311e6f
SHA512 e2248dee33ff8acd83d3cd15180a97574265a5e74b94baadb241f3cc9592532cb5e24887fbff7cc8cf7bc092ebacff8129bbe322095dfaf61e05a23fed077568

/data/user/0/com.eexs.tnzw.vjcd/files/umeng_it.cache

MD5 dca53be30bbb10cc8f549f46a2f45e15
SHA1 bc8238519e523bd147407f5c2cae05901493325d
SHA256 e0d2f450a1293a4db9e10831a2508c2d1142c17bef873cdf693679d72eec3022
SHA512 b7901c8e35eedab841dd30f448c42a3743d6309c3d611c08100fe3c09ddc825bb82cc85bbf7f175a187fc692a1a9520aabc47cc85f2d05f8ce187e919a602196

/data/user/0/com.eexs.tnzw.vjcd/files/.umeng/exchangeIdentity.json

MD5 9b50aefc94a41981dd7771e499b9a753
SHA1 467d7facc2a8f84b5ef97804793567f4388c6d03
SHA256 6e29cdc81cedb630ec9ae24aa4c9f3bdb9dd80f0790444860d50c4d0e78f9fe2
SHA512 04ef0ce90f640b112ec259d0fa907d9272fe1bc550392b1bc1215034cc4f66e0bea075fe58a57040349bfb7ccaba007eb0f246eb87abb59cf3c2fee9d1e37da6

/data/user/0/com.eexs.tnzw.vjcd/files/.um/um_cache_1718476731880.env

MD5 e3aab3f777e78f7d4a61129a5a7a21af
SHA1 ce4e991b85838dabbe5f9e572bbb1166678c4f15
SHA256 94dd879229644fe943085f5dc18f3fddf6661f5b2f57465b37c05de16bb070d9
SHA512 82a9510f7734bfe8f8f5544d6c4f8ff44ce496932a98592bd87f4bd10d6f81990e422eb7d58b0da12c4629df87f5c2ab0e6876ad4474552f963f63454e7102b6

/data/user/0/com.eexs.tnzw.vjcd/files/mobclick_agent_cached_com.eexs.tnzw.vjcd1

MD5 1b61cdf8ea6935c8e598b0d7f0a93954
SHA1 b0e12f0b2c8b8c908e1d969724d99a89bf5d8399
SHA256 cc1d6ab847d4ea28353830e5b3c4638aeea4474a5f989f90c354e26de4b5692e
SHA512 739022dae81621c2ed54a16a7c7176cbb91f945173b544589f956c4785feb53a4e9f40cbe38d58532ca745eefdef96729675a5191aaf85070dad7b7fa7b57e4d