Malware Analysis Report

2024-07-28 11:34

Sample ID 240616-13fkwavanm
Target b56dc1280d0b1e17cea95f74fc79b9bb_JaffaCakes118
SHA256 9cc6b5f14b4532c202b285716de4e7695e4dce425eca5097506e7219a32b0d60
Tags
banker collection discovery evasion persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

9cc6b5f14b4532c202b285716de4e7695e4dce425eca5097506e7219a32b0d60

Threat Level: Likely malicious

The file b56dc1280d0b1e17cea95f74fc79b9bb_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion persistence stealth trojan

Removes its main activity from the application launcher

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries account information for other applications stored on the device

Loads dropped Dex/Jar

Queries information about running processes on the device

Requests dangerous framework permissions

Reads information about phone network operator.

Queries the unique device ID (IMEI, MEID, IMSI)

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about active data network

Queries information about the current Wi-Fi connection

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-16 22:10

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 22:10

Reported

2024-06-16 22:13

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

185s

Command Line

com.fmfd.gqbb.kvld

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.fmfd.gqbb.kvld

com.fmfd.gqbb.kvld:daemon

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
GB 172.217.169.74:443 semanticlocation-pa.googleapis.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp

Files

/data/data/com.fmfd.gqbb.kvld/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.fmfd.gqbb.kvld/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.fmfd.gqbb.kvld/files/umeng_it.cache

MD5 5f31be557df889be82aeae35c21db3d1
SHA1 e268228edac74d991559b3d941daf3b19fd00f9c
SHA256 4c21295a002a7845f53f08434d06dfc41d2a8a92c5fc42d584df39665252f5ac
SHA512 fab8f3169f16372f1a903d2b3b8757ec03a6240c4ec1f0272c9200561b6c0806e0846dda082c2f7d98037ae47808d98522156c3bef65fcef51284a32eb313c0a

/data/data/com.fmfd.gqbb.kvld/files/.umeng/exchangeIdentity.json

MD5 3b86cccc5ae80c116f942c1507fb9062
SHA1 79bb431cff1479d5488d7c01d1ca3bc1f7e90377
SHA256 96550e60af8e9fbe826822a339f27c834a0c448e2975a4f45a66ed9decab5415
SHA512 e256fe7f340d9c277d40414d37c9608c2a14cd1f9775d0417d1fdbb6acba0aa15c5c7d5f7be0e20ab3ada7307e6f5ab9c88d1b88510960252001785047b2f357

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 96002d454c2f5480d65a75c60c01b7db
SHA1 279df414f44bc054c1eb9e06e77a844d72bd6665
SHA256 abd3bd3f779f018b5f9ef6aff72e66b138814bc16edc7b9239838a1c044059ed
SHA512 f7f2144968fa89c1ea4254e35b02762ee17ffdcb9a09b94acdff349072c3386c6719eac43942d6144db89cfde82c57d3e3bb36f4e2647b6c9393458a109e6f21

/data/data/com.fmfd.gqbb.kvld/databases/lezzd

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-wal

MD5 2a14d380474c68047b53e9703b11e779
SHA1 3079e667f52f0456bdd649f8bbd5df240332bdea
SHA256 dc1d53c31dc3eb0d4bf745fa430082ed828b88dbee86aec30d379bf348c0a85c
SHA512 2ee2a68949e4add89755290cd5a5d31cd0599612973a42ee2ee99682011a888eaa04a5c52d19f35c6bd478b6896be160ec7495d5f970e6020f2efb8351331c4a

/data/data/com.fmfd.gqbb.kvld/files/.um/um_cache_1718575888590.env

MD5 f0e911c10c24a1adbe596371ef521775
SHA1 dc5ed9b68350d4c944b8eb36afb0119004fbca0b
SHA256 099a82633171d749628ec9f082039cc0c78aa8f5609d58ac85e81faf9eba70ca
SHA512 280cd10e0e63c9fb441f03767c2668f2399d4a6881a9d9862fc12f1bfc4d97f9971170c6a0768b80c36de3905458cc5207aaeb28f69a74d90fabc6426dbf1215

/data/data/com.fmfd.gqbb.kvld/app_mjf/oat/dz.jar.cur.prof

MD5 5121006f811b5a3c63c2d975fffe09fe
SHA1 c3764ae4c6feb8cb29eea5c1c71b8e9c46a85b28
SHA256 6217f305cf11f513e62e574a6d29f7e00027a70ca9a50367cdcaa044903738a7
SHA512 8e622d66464a1763563708281545b5059ec745e4729561ed67bfbf28c18246898358cd6ce0aec4fce467c0318f4d23154c6b85886270fdab5c1c78b3080bdbc9

/data/data/com.fmfd.gqbb.kvld/files/mobclick_agent_cached_com.fmfd.gqbb.kvld1

MD5 0a8ea1adf8954eefd7a4c6b61ac030e9
SHA1 7c37041226a19dc9beb3ce0c9c4b87a52e19fa0d
SHA256 06b247e2d8879a0d89b677565f640b2b4488651f80408e9ce94209634e76b994
SHA512 f66c74776773f39d07ec477d89ee1b617567b872313a77fd0c3752038cec7bcbe05b06ce5478a8faa69eecd2ed3838e6c97beb0d074f41b930acc19398582c12

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 22:10

Reported

2024-06-16 22:13

Platform

android-x64-20240611.1-en

Max time kernel

178s

Max time network

185s

Command Line

com.fmfd.gqbb.kvld

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.fmfd.gqbb.kvld

com.fmfd.gqbb.kvld:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.10:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.10:80 ip.taobao.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.122.10:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.178.10:443 semanticlocation-pa.googleapis.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.187.194:443 tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.145:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.122.145:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.122.145:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/data/com.fmfd.gqbb.kvld/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.fmfd.gqbb.kvld/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.fmfd.gqbb.kvld/files/umeng_it.cache

MD5 adfb33fdbda2cd5ea2e468143b8c830f
SHA1 809eab01cc9d9571a5b88fd95058864de9424e8b
SHA256 ef900a55d3e4c25a92d188ca027617b5de0938fd9ba78f14afc6e7ade6ee62b7
SHA512 32fd9fc4ea863b3ce7ea6b1889533ce24fde67f1cca765e1d6b8425555942ee5cc24c90e4d0fa693f7afcf3088626e471d78fa8f0cec7f793f91ae576a30adc6

/data/data/com.fmfd.gqbb.kvld/files/.umeng/exchangeIdentity.json

MD5 8131e18118e82e826df3839c0335840d
SHA1 2bd529d18086cca4a0f26c6501da0d9e98deb8a2
SHA256 280dfd315dce2e44856b05794a96827917f64e4bcdd1dc859aba7f1fc0974513
SHA512 da745039b253c4495cab52104050764816e6e8345a9c4e2ff5485484547e00121b1628a80f86f877606e1539b657521ef53bb2365b158d63708e61aef038c7aa

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 da521c7da287e8fd9049e1925a51a006
SHA1 2715730d07c6dbcd494156bf8180b56027ee8551
SHA256 905026c08c09b64a24c98a3129e289de475ff47ce77d069e101a05ce61c99170
SHA512 d7ed87a6dfc058b09879a5013e8975616aa2804ceeec457f53b1bdb5cb94d1bd358b9f4f23d8c01da2e41e762bc7efcd431f4c93862555b94babb351a1fa2121

/data/data/com.fmfd.gqbb.kvld/databases/lezzd

MD5 dae68dcffc3d522a79f98ebbc3b6d457
SHA1 6df5dce9a50f12044a2d20b8d1742ae47b82ee03
SHA256 56cf91ca198812e0ef9ba4af0e96c08a32e24c917bcf2250bdebdfd7fd6f5286
SHA512 23b76f988399e9c9e4f5a7e8d19ecb765abdb115b0beee35f8ca9d221bbc5ee79f0152fac4261cc91eb9e7f874b5c6e9bff2dbb1812d31412d506cf83c16adcd

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 9b3d93c94c2b3ce399803e668c184885
SHA1 718a2cf8f851747582ceb63bf51e66cc2c30496d
SHA256 0f0e138e1ede8f362f511efed610caedf3ea37ec0139988b8c25b621dc7f5a3a
SHA512 8a332ff923daf7b91569390fa7a634aabe09fdc3c59124d00494f26d34a9fc28785dfbf3104ac21e596d8fde44dd8f9bd18dd1e3aecf809f40f5034bc37e006d

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 18d8819673bb29aff3f0ad114398b600
SHA1 af8030a29bfcd4e2c7df6fda8da3e7b7fcf85c76
SHA256 a83bc363e38e96ddb22ae63ed3af944cb76552c2539644477ff5ea65045112f5
SHA512 e924367216c51704b951bba4d3ddc76cdc9f7f543c921427fe7edbdf8594d41b3a4fc142344ad51fb10db34e3006f42bc452b0409c29e0e899540975c6514790

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 a625303950b4db47ec19a3758a77ee02
SHA1 3333f76b8c26968ce580bcb5c102f6d5eb0f72e6
SHA256 4e7a9e6233eab097fe2eab91a90e4e8e511bd4d84ab151ef87795a05f35145b1
SHA512 10af405986f9f5ae613460fdcf5031ebf6dc98873efb2ab1d9556c0e4c3efa767a780525a09cbf887eb1d5e680b5eb19ded1dd2687bcb8345ec0e10af5553b6d

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 e6dd6c14a56024c12cc59880fd38a02e
SHA1 5e86380da29b876f745247b18309d7fd8ebac77b
SHA256 294ed88545089ce597ce05bd5a591808825ea3fe7194af333952682f3cc35a7d
SHA512 959b7999ce640e86ed56372534c86420251c6964aa8489d506b2cceb40e35d0128eb0dd1bc7917aa0a380626def2ec2c00a542413f665e3e118a812c346dffa6

/data/data/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 48c55fa71805d7e1bbd532ee3057bbf8
SHA1 d6d84b3664c37953177bad5503847d064b58e0b4
SHA256 29bc917f9aeaa092f6a2ed889a2953dcd7f4348bbea1962b61a50c89205646f1
SHA512 be2f906732c8d32c3120eff070b44ffe11f04156837e92e23ffb2304ac58095a7005543f46166a9aba9ee8073706eaf9b276e6dfc625490a81714d314b722376

/data/data/com.fmfd.gqbb.kvld/files/.um/um_cache_1718575887816.env

MD5 f45d875251821acf5249662b68653c8e
SHA1 37402b4a5b965c7a3c61640014046677a448679d
SHA256 ca52402e6d29f927c19ae898240585bec8c02c43894c2e55868953467c7b1a2f
SHA512 fbdcd2f1818e256a20708c2155f91f794984ece6aaafe4ccea817eade52889343e96dc665540040b188fa5cc70ed130ab94d6f9ea67e827596f6ad342d07c2c1

/data/data/com.fmfd.gqbb.kvld/files/.imprint

MD5 9e8dfbd4883dbde2b4c01b27b22b1481
SHA1 e1aa0207a527d4d5587ecd1c498e07ca6d47fdff
SHA256 e6b5d2685ffa062cfb0a8793794bf28c617daa150b06c6bf9d9908d3ce03c61e
SHA512 a48acf757acefc4ccd9e6e4188eeb746318313b04321297a76eb4cfe66b0fce9e5e77a8c5b9705c93247ab335ffa79469018e4416e7d367ec047dd3342c0dbe5

/data/data/com.fmfd.gqbb.kvld/files/mobclick_agent_cached_com.fmfd.gqbb.kvld1

MD5 e76d745f38600d9b9e1abd2105717641
SHA1 8c7922a8e29b5cae3baaf147c476c8a46cdfa55e
SHA256 5f166c55bd390df18da1fd49846978f70938857022552a936122b65da5431eae
SHA512 05688def43b2ab773a5c585f207d3bd07bbde35c1224dca580b01c6ae6eb852605ea12f63427e69366c9ce1111a9b8007d6215dcc2c536d040356527e22efffb

/data/data/com.fmfd.gqbb.kvld/app_mjf/oat/dz.jar.cur.prof

MD5 c78b0059c974ac8dcaf1ac03ab48bcb6
SHA1 7928897f2ad2e3ef144b8e1ed091b2a19433b248
SHA256 ff26e2d5abfba5b10b448474516838954fed479b27ab307525116f67d84c546f
SHA512 f8fa44f8879209c577767cb61bd030abd3d1a22bcbbe54307e09e82177e765d2f7ccf2ac78831508119c9d7cc8f507294b3fa18a07bcb2e635c32dab38f8261c

/data/data/com.fmfd.gqbb.kvld/files/.umeng/exchangeIdentity.json

MD5 a0a373370072aec2b6ef1814369ff16f
SHA1 f2ba874c4f3bfbabdc1f30513b2e64f782116b8d
SHA256 facfa1fad73376b42f2f1e6b63ff1cc73ce819486099baaef07a3b3f46d9799d
SHA512 164fb50adf15850160e85a967e2062da919b916234b39efd6a5c0853d16b08667676d2a57dee377128ba4e1e5d24d29e45edb8fbfcd42bf4931c741d00d06df5

/data/data/com.fmfd.gqbb.kvld/files/.um/um_cache_1718575996567.env

MD5 27058f9d4de907c12dfe3c04bbc3babe
SHA1 a314277d0ad3bdad7a912dedc4b9b022549090d4
SHA256 2ea6117c36999868f5d5d1b886276bbcf334438ba566b7964fe1fedc258278b3
SHA512 49cb432b13af18ec457e04a7c23a48493151584ca041c17758eecb95670931a27f9e4a2cb51479949c6e68ea29aa605c091b79c61a04e6342fa3c2aee0e7781f

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-16 22:10

Reported

2024-06-16 22:13

Platform

android-x64-arm64-20240611.1-en

Max time kernel

178s

Max time network

184s

Command Line

com.fmfd.gqbb.kvld

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.fmfd.gqbb.kvld

com.fmfd.gqbb.kvld:daemon

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.8:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.212.200:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.8:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.122.8:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 59.82.122.8:80 ip.taobao.com tcp
GB 216.58.212.196:443 tcp
GB 216.58.212.196:443 tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 59.82.122.8:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.122.8:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.213.4:443 www.google.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 59.82.122.8:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
GB 216.58.213.4:443 www.google.com tcp

Files

/data/user/0/com.fmfd.gqbb.kvld/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/user/0/com.fmfd.gqbb.kvld/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.fmfd.gqbb.kvld/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.fmfd.gqbb.kvld/files/umeng_it.cache

MD5 e1c8734e5bb9850cbf3a3ce20880a471
SHA1 3fab401d5d68c62475834e78efb5fb8e922ded69
SHA256 9ff38e8a9cf5f0f988b9ff558b79afe23ed2f56eb3a43248d7e7c1f50506b7bd
SHA512 b33827c47ef330bed3aa34d02b67bbd9e69eb35a96dbcbbf53d07b3e8d30186b20131d619f84d181c2bfc486ee4786f3da3278eb34497eaadcb571fbbfec2d1d

/data/user/0/com.fmfd.gqbb.kvld/files/.umeng/exchangeIdentity.json

MD5 3ee59033bf1a000b651f7c0d1db7a413
SHA1 ee2727fbdfca8f077133094866eed261b160c35f
SHA256 8f7fdd9a271e1d73df829a24a21623627e17e37d0dc9094a5b3088875cfdea48
SHA512 74fe698b53991f5a7df666eb06933b512454d7b889f37dd6aab09e7a770b261215afb6a8e256792b095c56dfcc8095a0668f1c5cd8d5ade9b9e1f73d7133307d

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 387c23cade20704f53e4cce1627fcae1
SHA1 495b855da53ff79ebf1c9d6eb2ca003f1c024073
SHA256 3f1d492b80d2ea04378afe562f0590e7bf118b6f854ac26940a1a1230194fbf9
SHA512 92c83d893124684b0fc0433ea8d6a054d614669812ad65d9337ddc163966d74d3018bb3d5b424912b7b87b4e865e258af12cf78be6f497638639b76f1568ccd6

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd

MD5 fdb8a92e5060ce104e8f0faca55a47ce
SHA1 270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256 194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512 ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 82684efa4d4ba0bbcca837e1964f807d
SHA1 8068e2121a2dcec87c9a4190441ed32212e38163
SHA256 46941fae46e6fe0b109e6f79f4a2065771d6b6fe137cc32551ab556d566516ff
SHA512 64d39f528be19398107714fcd203a5355a556475da0a90fc17c8d3c7c1ce5878276aab32a8c66f62b5b416f90ec64bc7bfa6e52041049eb1887498937eb2c5c0

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 231a80084195cc455202a7a40cda677a
SHA1 6575644d1a3044417e288dbb54bcc4d4fd8fc464
SHA256 d926c18414a116f611ef86189ae822139ec3aa197c8c49b64a71558ede48e85e
SHA512 937d6bad788447bd4400984829980ef5d4b9f42369fa272308904e9d395ec1a7c8745918595f5d25de3f21f1e22c555dccec5a31553311e03be2f79c39fc9bdc

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 82cc554fda497d4bdfbdf546b69f693a
SHA1 be8705790ad8ffe263b27bb6e5de23bcb67ae003
SHA256 3c5cb014d8a755e6576ddcffd296a7867dd12108761c5099f13151d5ef6dc175
SHA512 6933ba901ba60fba1684a2520782dc3f86dd4da631c53ed034e34382a1ec3d6130eb71ece0a623770168351a19bd87b244cf4076463f131d72465816df0de055

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 ea7ff6754c7872e43e256f274ce23188
SHA1 0b1da6b5507bb4d4570c4221a94d2d9b778395e9
SHA256 b6845ed127433d79c48a64301f779fca042f94b68f37cf4fa57b1985f51d2094
SHA512 29acc8dc9607f4be39f155a875d3a4d2704d4ac87077f70879182f966238113783b8a47f0c947de880c18ace5e1032fb70b1797153f2d36d111276b4e45ca693

/data/user/0/com.fmfd.gqbb.kvld/databases/lezzd-journal

MD5 e7bf12794d6266b58b91b97561e703e9
SHA1 fecf8885b4104e5b4128ec1cd1dfa6f195a0573b
SHA256 a515cf61cb2fc64e9e3b51551a84f9966213d02a20bc1afa296eb7b86941975f
SHA512 5a44fab11908caa831e1f29e4f50cd06f7ba0663e26bedf77bb93d11edb789f38113ad7ea0134acae3b2e37ee2299dc8720fbd4a4968e3b670f3e571f2ed4956

/data/user/0/com.fmfd.gqbb.kvld/files/.um/um_cache_1718575887188.env

MD5 a1bb5da3bcad30a6ccf24b289e717aef
SHA1 1902ca112b38196f7eb46f65f6a52ffaeecf569a
SHA256 52fa56fa6c68504bc9fd485726f00aff4586de3b60dbc65147bbd5c3890e5a47
SHA512 45a80a834c615ea25ac9037bb42f87c4a8e2cf16c16d8a3bc406fccd81915228ed3a5a40f5de5fa0908076797040d26cff4dd1b07afee329321070ad339eaba3

/data/user/0/com.fmfd.gqbb.kvld/files/.imprint

MD5 488030a7eac44ad2e100a04d6bb9d2b2
SHA1 4f049a895bdf90623b6c077636a63bbf65f0ea29
SHA256 9aaef8c19a9fb2e99f0c4e3dfad6f03f646719e4d96c72f40e3cc6ca19e73bf5
SHA512 fe409ebc23c51fbdb2998aa1233111b1770cd4677feef4bb92cdb02cc5de07c180470b80396dcab1f925b324b47adac35d35b018f6a8a26895bffed2a01e4d02

/data/user/0/com.fmfd.gqbb.kvld/files/mobclick_agent_cached_com.fmfd.gqbb.kvld1

MD5 197e76671b172fb39faddcc3c93d31bc
SHA1 8f856e5b414043891cde6d0e1601a66f85c57f82
SHA256 b249ebeaa783bbb3e0efbcbe7589ed08e7db6096aaf8165fcbfa7239cd925ba5
SHA512 871e13ebccfc98683bbc09952e8a6c0450304e02b8d8349528f941f151ea7587d0d6774f32eb32bc0e63c6019445041d510e310326211cd368496739cef11d5e

/data/user/0/com.fmfd.gqbb.kvld/files/.umeng/exchangeIdentity.json

MD5 5c73aec1a76e4edad2bb57f4c328f453
SHA1 9487e3af8b22effabf29fb7b0366e3f9dc773257
SHA256 f589b888c91f0db6249bca6e15c5f06b188de3ece5cd35815d88490e656c7a27
SHA512 192d97644e31daed14782b926e3e603d4c6a0ae1c44b2644c4d070ec0ec10f17bbb5b1830c3224317f96e0753ea1140bd5a66ec46c86bdcf4afe4d29704b63ad

/data/user/0/com.fmfd.gqbb.kvld/files/.um/um_cache_1718575998527.env

MD5 3a3bf99919cc8e1079f905383ab88364
SHA1 5f72ad8e6db0b959fb045e0faea62fdcdf090abb
SHA256 a4909a931f954fe1d80417bf907d5254e05166733d53d85b53ad4e04f8e2613b
SHA512 92f3f4a8d6bfa410d4bfe3966fee9da4415323f46bc3819906a1a48a8fc62360eaee551e3824e7db877d38bc9af8c03ac6764d12205080dec82d8dcfb08a5d1f