Malware Analysis Report

2024-07-28 11:35

Sample ID 240615-z63zxavcqb
Target b02433d25ac373707f77171e7f015c78_JaffaCakes118
SHA256 aa036050d87a15c0f8f26ad006e4bccd5a12c26ac982498290777b5ba4a5e6ef
Tags
banker collection discovery evasion stealth trojan persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

aa036050d87a15c0f8f26ad006e4bccd5a12c26ac982498290777b5ba4a5e6ef

Threat Level: Likely malicious

The file b02433d25ac373707f77171e7f015c78_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion stealth trojan persistence

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Queries account information for other applications stored on the device

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries information about running processes on the device

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Requests dangerous framework permissions

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Queries information about active data network

Queries the unique device ID (IMEI, MEID, IMSI)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 21:20

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-15 21:20

Reported

2024-06-15 21:23

Platform

android-x64-arm64-20240611.1-en

Max time kernel

177s

Max time network

181s

Command Line

com.uykh.cmfy.orwq

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.uykh.cmfy.orwq

com.uykh.cmfy.orwq:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp
GB 172.217.16.238:443 tcp
GB 216.58.201.106:443 tcp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 ip.taobao.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.169.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp

Files

/data/user/0/com.uykh.cmfy.orwq/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/user/0/com.uykh.cmfy.orwq/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 eda0f277da6740d0b9b13534dcea07ae
SHA1 7e4146f0180b6c20e9b984b175852645b3bc8ad6
SHA256 5ce528cb03be2b5d512cacc60a545622a526dd8ba9a3827cc27236697b6da43d
SHA512 11d8d3dfb85485fd1ea77f6b92b2bc3df9948a59883105384a6304e59849f968b05374e0eb92dc3f548584eced1c8a430e941b5bf0eda24b07ef2c8bd873533e

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd

MD5 fdb8a92e5060ce104e8f0faca55a47ce
SHA1 270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256 194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512 ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 4bdd56744b24f5204bab2f05bd76dfec
SHA1 41b24e89e172d3a916c8d3706ec273eae580e30c
SHA256 c14928a7ea26a64ffa6f0d542c36f2ab3c0138f039fd6143ddf3e8f91c5be452
SHA512 46e74d15330fbf6eb441d258fcc36858b9bfde176793a67bb5d4a40be78f4a254c939c8e8235ffd66f1b3405d8ba7fd9b4c27ad1f28ff5bad8c517789d0749a1

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 15bb7156bdb8e8b7eec5930d7cc415e5
SHA1 012460276c8b3a64c72adfdee64c3cfb80556976
SHA256 7606ab96a1c6739981facc88fe93b2011e05a8003c10c99ca9b5502f2237aef8
SHA512 7b65481c24a98287351a0932987d1f5bfcb91fdfc6611aebec49079a37826a0397a7a22e912fb7e2d4baa79e9e7fe2694f4f106fe13adbaa742c3974f7043426

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 e3e21b22e93d1c241a2504309bb8b028
SHA1 c4c2d91818fd1d5cf4f16e7345ca583bb9052b58
SHA256 8f85db7a7fb30da9338e847a6c3e878a8234af7cf62cb538fbff099c735fdeec
SHA512 28643be48e32bbec526539dad1d99d4e9c949687b8ac3b542de35935a31bb5c98606328bd1f7acb73261c40616e52170ec7fea45fa60def89c17507fa5278685

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 cbe1865d810626c8150ee2da47d7cdd7
SHA1 fcc6926ac86cc77e0887dab9b96bb8f26a740159
SHA256 bb5193190e49e5452263702a01d18d8b59c0c7c8a4246a4f53c34058a9dfbf50
SHA512 27b594fadcbe4552b34812c3e318f8fd2eecaf5f166bbe143de4c013369b5e45a8708fa374674f4e4ee7311c8c79919f5f27b382a8c4c78c5750c0234b2039b2

/data/user/0/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 0eb3a462e49f0c70f251c2d1904181ba
SHA1 ef8d5faadd549ed3066637edc5e83d373d48674a
SHA256 42371f113a1376de6cf2768cf097c41ded27215c29737dc05bc867c8e4a24d55
SHA512 8ebf6ed7428e48b19ee0f15088c9ce16a00014cc9a399879e0cf548a2e0dba12dc3797b2281acaf1baa201583d8d41ea7714ff2c92e87dd347d4f468f37a824c

/data/user/0/com.uykh.cmfy.orwq/files/umeng_it.cache

MD5 4cd574ecf76c6b1c0cb2b00a5c36f752
SHA1 4028cfb084372fc47e76f989f835d6d1a79ece42
SHA256 47da21a0135251987a8ebf4fd7132cf5f134f996658d5fd92f4172808bb18617
SHA512 81678870e77c4132050b4c7ab00eb7553ea1351c401195a581a100c8cc16af090cac7d553ef29cc857d746f9ca960d58b8a9b67f0149275fa4c123959cbab9f0

/data/user/0/com.uykh.cmfy.orwq/files/.umeng/exchangeIdentity.json

MD5 4f75266be78f8c25ce1aa30a3e0b9d38
SHA1 1fc66abda6e9e0b6fc28437271829af0df0a59bf
SHA256 d94432f0bf97abf907538ef3de7f04d13746b7f78f3a38257d1cec74544045f1
SHA512 d1358978fa5383d52aaeb71eff7a177c07164c32434a19f67f9f7d3d550efb669601517b3cf167696c26e878aafbfbf65c1ede8640f0c0bfe9e751a5234b5f8e

/data/user/0/com.uykh.cmfy.orwq/files/.um/um_cache_1718486562853.env

MD5 d600b0944d2d8657572f5559d181bdaf
SHA1 58540634957bba82df022557a581cfd3599d30ee
SHA256 9c88c96d1ca547189510f0d0ee9f27c68f2f8c7c14161e0a7f6169fc092a1fe5
SHA512 ca551aaf02b3e02d3a84b1ccbcd57493d8327a5c2b17c9ef871696a6549162d172a9af7e9ccd0b9ed4941a65a489fb4a6664517138cf35c546933fa73ffc4a10

/data/user/0/com.uykh.cmfy.orwq/files/mobclick_agent_cached_com.uykh.cmfy.orwq1

MD5 9a8ab2b5f94fe630bba2544e07045c41
SHA1 0f4f72da15df481d7f9cd5b8bc2e51ef60a19693
SHA256 a752628571607577035fddac4f8355cf1f3cddb97e2ac8351bc64bf80ca0a430
SHA512 06173e5ce0144d6388f9e29162b1d9fd0a3849b2ff107a26300315ec734b22574c8b031a326f45c79ea7057520ddbfbffd9efe9d0b0bd9eb9b2032f9d0d138a2

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 21:20

Reported

2024-06-15 21:23

Platform

android-x86-arm-20240611.1-en

Max time kernel

177s

Max time network

178s

Command Line

com.uykh.cmfy.orwq

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.uykh.cmfy.orwq

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.uykh.cmfy.orwq/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&

com.uykh.cmfy.orwq:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp

Files

/data/data/com.uykh.cmfy.orwq/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.uykh.cmfy.orwq/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar

MD5 9b47e78a6ff90cce5755ce4742047627
SHA1 831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA256 30d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA512 4587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 1e606782a4ee1e0332050ac7b485df71
SHA1 092936d47e23a2c4da2aec6dfe2485c03ed830a2
SHA256 fca6dea7b487aa4ea10961c2db659c06d871c4592e939600275b75bea61f77a0
SHA512 f589759253cc34cb0cf72bf05635c2a494a93e239d2d66056618cf0c408927501a84ba4c3cc9eb71c4e3b2f8bf6c9027e504ee4f5e99c6d9435fcca8af7da24f

/data/data/com.uykh.cmfy.orwq/databases/lezzd

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.uykh.cmfy.orwq/databases/lezzd-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.uykh.cmfy.orwq/databases/lezzd-wal

MD5 90d4cf7334257bcd5b527c04ffde5733
SHA1 32a315ce76ec1d1966a8d3046133383108a8db74
SHA256 bbfde46abf569eccf1f4ca75fde86b5111d79aa4ea4f6775d53780b66e96c847
SHA512 102874f329c75666cd9938b2b0d0a2d456a973019148704a20e5c5fdc2eee36641252e4250a091e7bbed46e4953c9e34cf9c7418ae29f54482dc1d2020fdc083

/data/data/com.uykh.cmfy.orwq/files/umeng_it.cache

MD5 1ec679934869878b3b740b5b38459fe7
SHA1 4db177737cbd63e0924c54c0fee1898cf4203995
SHA256 2439c1470e1e887bdf718389dacfbf6a3d4666a14aff5cfb4ef1d031b17251b5
SHA512 5e891101556027c09918f237ea13a3df523cf9255bbdb5cd1ac18b6730f7748b51c1afaf32a8936dedefebc4c65228b7d528404409f2d55cbd8e9db189e0d058

/data/data/com.uykh.cmfy.orwq/files/.umeng/exchangeIdentity.json

MD5 df05e31f9a89790e6a78f1be1598c779
SHA1 46d907c2ec07de74b8dddad948224ed5cf5047ba
SHA256 256dc5ca4d57fd77014a4cbac0d018f5c43e8fd61e2921508ce34c67582b303f
SHA512 c74d42492e487542263edcd15ac6867580cb2b90fde067d007a73623f57a48648ca94129277ed2f2c907b5be2913232f33d78eb0c99e56a6ec4e5c3d3b42114c

/data/data/com.uykh.cmfy.orwq/files/.um/um_cache_1718486561771.env

MD5 e6eee8ecbdcdd6917f9dff97ddfe6d51
SHA1 3a42d7ea098f870bc5f50802405ae0f7a2887546
SHA256 0c8d5371fb8f90c06ca58089aeb6f2e0d4c96a5d4b794600f53f65c596ebba22
SHA512 85f8e34ef818b6c87e8d8fe48d0a1264e4b6ca4fc484f697a70886bf3d6d35f9ae91892c57fff3a3610819cce0db9db12610b43e12c0dcf79c3c85598bf80eb2

/data/data/com.uykh.cmfy.orwq/app_mjf/oat/dz.jar.cur.prof

MD5 cdf150fd20075a308e49536a35db1a2d
SHA1 822c784da7b75d89c49fb60719a96158aa0f4d21
SHA256 e04a6917ca40149e48d32e16e30c428906e8e57ad42304d054a545bfba868801
SHA512 fa6f08444384cf1fc6c229b6db07196fa29da0c9ebc615707616ae5c254febfdfca89a590a4d9f668518559682a7db28ae470c2230f987f6e009161dafdc27df

/data/data/com.uykh.cmfy.orwq/files/mobclick_agent_cached_com.uykh.cmfy.orwq1

MD5 2de0e3622115ca50fed252f74378e6ad
SHA1 7a6972d3047129f21ff06165fbacd7e8bd2408fe
SHA256 9c764c35b4025967402d7029ab2b4fc822b08ade41784e80229f7ebdc68b7681
SHA512 2f89026410696f62302a616bca6c206e8c49adab4b0db653d465a8f09b175010e580a0697069651e8d23097d96f5926c683c4d2c53b7c2ca9c72249771c96325

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 21:20

Reported

2024-06-15 21:23

Platform

android-x64-20240611.1-en

Max time kernel

179s

Max time network

183s

Command Line

com.uykh.cmfy.orwq

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.uykh.cmfy.orwq

com.uykh.cmfy.orwq:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.179.232:443 ssl.google-analytics.com tcp
GB 142.250.178.10:443 tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.204.74:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.178.10:443 semanticlocation-pa.googleapis.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
GB 142.250.178.14:443 tcp
GB 216.58.201.98:443 tcp
GB 142.250.178.10:443 semanticlocation-pa.googleapis.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.213.14:443 tcp
GB 172.217.169.42:443 tcp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.172:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/data/com.uykh.cmfy.orwq/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.uykh.cmfy.orwq/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.uykh.cmfy.orwq/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 cbd4892a7906ad60a8fd87e9a4ab3f03
SHA1 dfc692741d6623a13528f9cf80ce30bebe8f8abd
SHA256 78ac1b2f5de5d8d86826453bf90b97d266fa2d5f87f8d5b2fd2f7d0dcf5c951e
SHA512 229fb2f170d1f4bbe3529e6124ebd75e806a0f52c77c95dbb983ea55c2ee0346b75a05f31df400ba2ee7e34f8aad63be2f28056bf3ad16dd11ac7f3ea7f5f494

/data/data/com.uykh.cmfy.orwq/databases/lezzd

MD5 dae68dcffc3d522a79f98ebbc3b6d457
SHA1 6df5dce9a50f12044a2d20b8d1742ae47b82ee03
SHA256 56cf91ca198812e0ef9ba4af0e96c08a32e24c917bcf2250bdebdfd7fd6f5286
SHA512 23b76f988399e9c9e4f5a7e8d19ecb765abdb115b0beee35f8ca9d221bbc5ee79f0152fac4261cc91eb9e7f874b5c6e9bff2dbb1812d31412d506cf83c16adcd

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 3e16fb1b5305b87b2b27acf8361159b7
SHA1 d60436290f3c6c031611b1f32c0ecf453ead7c04
SHA256 7aba82a88dd55298c697e8d05139b2bfe711d4d2c26c98b7d99fc2444a9f2d40
SHA512 160ac37ba51544544ad085385d997d57cfb29c6810dcd2c65594226b5075e6199e309966f1f85f1fb2d256582a01809a9ab3505112adce538661649df64a5366

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 5d1a5785f9a493114b0034988bb71cfd
SHA1 5b4a71c4adb7c02dbf0a664d447f33f58445760b
SHA256 87250c4fb6e55cf90cb09ddc7ddaca09fe90ba9e9b43bf10f19b0895eac5fbd1
SHA512 d0025fc311adc2221b76dd3bdc1265a3a56fe3f63ecb9cc65d04b0ff6534faa42bda79fe4886a632209593b8ee77ad5d24e0a658ed3f605e4c885340438cdd75

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 edd96642f3764ebb8e2dd742245d6c12
SHA1 184e21165ed5ebaf3e58dddab14ddccaf3efe57c
SHA256 51b3f8c225c47f25b19a389c860ede04fa798278d1279334d34c65eaa630588e
SHA512 02e4975a7e9588129d8585289c7ac01eb8cceda6da954a3947a4083c5b2227ed9b1964100edb563694d83616f5b3fc5871e060d35ef1372b1b2030355f4421cf

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 9160767c0fd4b91837c250d0c2670ff6
SHA1 925b970606bedece9eaab4ddfe151b015063b1b2
SHA256 12a52a61a44ef3bf76a0c159df0a914def78c652005da43d97ae5541f97fcc6f
SHA512 4ed30c6ee0e476e06f7fbe2c60d7a3c57b6fedb1ec8dfea6814a7baee49d04d0ba11901c8f601cf9ffeb10fdc4f9af397cf25f566abb6cf885611b20cf3b2d2b

/data/data/com.uykh.cmfy.orwq/databases/lezzd-journal

MD5 8eeb148337b9c8ce474a5df03c11dbb8
SHA1 69a4648afe68bc273f671d51c2fcb05ee45973ab
SHA256 b80664f53437e8f23467aacd30a5992deee3b195239bf0828c43653429749733
SHA512 3d4de872e601c8200271f474b0e3c3ccde7a998fc6ffdde4dd3854ec13c9b0fdfbe5beaf0dcbe66da28662482bbe43d216eb18ac9bd53dff9a554970b065ae43

/data/data/com.uykh.cmfy.orwq/files/umeng_it.cache

MD5 e9925a3ae55820139e7bf126b829ded7
SHA1 e5902b2ef20ef6370a3f71b0f8783abf39a89576
SHA256 8b36e604379e6c08aba7be6a77bd922cd0104425c20a09f844ec4788d69fb44f
SHA512 d9302dd757fb709bbdbadf62a7a360ab84c538df2f620e9d64f4ff59ff8b7d36707dc3eb381e46da0a5d6630d26b9ce8084ff1fa64063f2424956f08471dc08f

/data/data/com.uykh.cmfy.orwq/files/.umeng/exchangeIdentity.json

MD5 526925964a8929d3bc0c51de28c2e633
SHA1 4346681d6a1b0dbf59f7ac5525f9594a19ac7356
SHA256 1cfc2a2acfaa139f91432331dfffead534e4797bc302c7b0eeba27e28c215dfb
SHA512 c17cc4188e8b667a81d1c6d666251ddfa728cfcc6c639e53e7fe0511c16cbd4127c5f424ee2a5d03c3442f02d9c409c6291800b3db2d7bf61b4ab734be74c974

/data/data/com.uykh.cmfy.orwq/files/.imprint

MD5 72e2271b4c2c38b6eba37d6565d11e6c
SHA1 9d3addbb01c3de33684594b4ae41bc99841dc2ab
SHA256 6027314774747915e768f24757455455e7ca2e9223e09dc91f27ff32472c4a82
SHA512 f6d5e4fdc31d176c0721aa972d51b964fd6cc0206c30a999d89d205fafa7dd6e64879b4cc33b365718d3f7557dca2bd3c3601e7f60f9685b5e95f8b7c3811af4

/data/data/com.uykh.cmfy.orwq/files/umeng_it.cache

MD5 8c148803697c7d2784040508a0847fbb
SHA1 8c377577564a5fb3f5cb0536fb3e22157916c4a8
SHA256 346353038f6ea68a94ff233a5d45a52d2d7910657ca0386b6963df2d036f87f4
SHA512 d281c8fd8f84219643eb6ee11ac6c967e42c639a169e6b0257099596971b27224b24f9337d593c2c81f640b84241318ab7d073f3c667ba6ad56355a9771878bb

/data/data/com.uykh.cmfy.orwq/files/.umeng/exchangeIdentity.json

MD5 1d7012e895ab00b4adc4e8fabca20417
SHA1 c525ba1acc2bafa0a29bd38abe69b1b35f92e3ba
SHA256 c4baa8c8585472a57cdf656757c14e11a7ce39707815073fec4c2e3aca111b15
SHA512 37bde579dcce905a3587c9ab26a6450889175fc3cff79cddf5e6dc3b45b65dc4fc5cbc82a520ec6cdcfefa12dfa65fa27d95271513f71e4542a17506a60d163e

/data/data/com.uykh.cmfy.orwq/app_mjf/oat/dz.jar.cur.prof

MD5 a87dc1222e6546c25bd22b812f178fe6
SHA1 a7ff038b70956810393286e7548b0520db8b0fec
SHA256 6c57fb585b9619a0b77b41356f48ffe452d24bc8824eb273facb7952e208997f
SHA512 4fd4fc5fb5cad953ac9e1240526c3ad3f864d197b08bf98713b70992ba1d5def64aa3d104786fd16828cb5e064cd931893c11189b4f8d82bc701d01a62bb4d1d

/data/data/com.uykh.cmfy.orwq/files/.um/um_cache_1718486621913.env

MD5 a40edb7c3367495845b67b715dc2e683
SHA1 c7dd1077538e5c8fec53871b906ab187175ce213
SHA256 147da785d441a386b205d548c6c26a4a8b9da3a2169d152bf12f860a6cb2bb0a
SHA512 2995edc0a9e638f22e6b680d3ab3c722553e3bba9a6294bc5cfa74e972b34e4b1e6f2eece868a0c4e1c9a4ff6ee9fa1da8295391a6458a23e4b7e3fe0b4e51db