Malware Analysis Report

2024-07-28 11:35

Sample ID 240616-rayfjswbma
Target b3df3bed219262ac41a292c793bca25d_JaffaCakes118
SHA256 9da270257a4a4dcefe0f75221baa1f39d0c63e2a4dcc50b1bebd02f0c98ceadb
Tags
banker collection discovery evasion persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

9da270257a4a4dcefe0f75221baa1f39d0c63e2a4dcc50b1bebd02f0c98ceadb

Threat Level: Likely malicious

The file b3df3bed219262ac41a292c793bca25d_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion persistence stealth trojan

Removes its main activity from the application launcher

Queries account information for other applications stored on the device

Loads dropped Dex/Jar

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries information about running processes on the device

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Requests dangerous framework permissions

Queries information about the current Wi-Fi connection

Queries information about active data network

Reads information about phone network operator.

Queries the unique device ID (IMEI, MEID, IMSI)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-16 14:00

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 14:00

Reported

2024-06-16 14:03

Platform

android-x86-arm-20240611.1-en

Max time kernel

178s

Max time network

178s

Command Line

com.xzwt.lhyr.lkce

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xzwt.lhyr.lkce

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.xzwt.lhyr.lkce/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&

com.xzwt.lhyr.lkce:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
US 1.1.1.1:53 alog.umeng.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.14:443 android.apis.google.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp

Files

/data/data/com.xzwt.lhyr.lkce/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.xzwt.lhyr.lkce/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar

MD5 9b47e78a6ff90cce5755ce4742047627
SHA1 831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA256 30d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA512 4587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc

/data/data/com.xzwt.lhyr.lkce/files/umeng_it.cache

MD5 79ce2af298e597906b5d73d118c65ccc
SHA1 5b528d5f86822c38e61aecb3588ecf8461ecfb17
SHA256 d9be5e51928a3cb768716f38fe8e44f949e2bcd9028a0951211fd6abb4ba37af
SHA512 6c7343b892f3bcbaa1a27ac95b09bb2c2082478bfcb725591b57172785cc6b347cd473e8ff9f05202682552585054aa46d58e898ef42579a4952fa4ffbd5d207

/data/data/com.xzwt.lhyr.lkce/files/.umeng/exchangeIdentity.json

MD5 bfc52f930b9522c799a614cccd378640
SHA1 73d43668b851f255115889dfed4334e251e6442a
SHA256 4f1384f7919bf9270ab9b37cfd6a8924c6ba609516d4c9d3d9e8d436211689fb
SHA512 1c276dea09fb623f05bf2258acf6ab7e189990d43c982f1ec73baa5fe22cf9fddff6762445b7b214993ebcee703bad01961672acb2893627f6ca6e7d724d596c

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 dea9fa3b4125df48fe9fba1974618588
SHA1 e65d11aca464d5470086fff8c032b8a162d7e22d
SHA256 5cab3ac6f24fc8a448903021bc05ef0686ec5513f266f895e5b340df3c3988d3
SHA512 00e4da4f6217783040aefc6a471cb036fb454dd3afc31b6e967ed46febb84904154b2b8ba048f687b254360b2fadea442e2d29edf88434c579379bb50b13c488

/data/data/com.xzwt.lhyr.lkce/databases/lezzd

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-wal

MD5 a3ff831c753992f0c2d80d1166d6c15b
SHA1 dd1975a9b6d82b1a0c7eebf1b56796172c236ae3
SHA256 3b7fcfd2f4781588db97a0f0be8525ec060257755aa537b4d7f636caf0d80fff
SHA512 7dd398b7efd3e1d6327700e30a17846252c80ad1d81218de33da1c0e8fbf17d20107817a1704af23e73ddd240251909416f88c0b6c94650df4673dbc6dc1473b

/data/data/com.xzwt.lhyr.lkce/files/.imprint

MD5 6f3402635e49d3d40ad43561d9ea38fb
SHA1 286cc6b03cc7ca390f394dc8b680818d8baa675c
SHA256 6108a52004a7d48895a03105b2e70ea49bd00a2055c1de4459671741b9a0f701
SHA512 788443460a3c844d024eb17a540e029fe2cb89a7d6ad3b5b223d76f5567d9f1cfb299c3f8ead705f8f1c39ec6963f49b2da319628983691ac371831e849c8f55

/data/data/com.xzwt.lhyr.lkce/files/umeng_it.cache

MD5 ddb7c1fcbf89752a40839e116edceaa6
SHA1 aab41eec955f6068b86e9f67d353ee3a7d707fcf
SHA256 92b4c9bfc85441432254fb57e1d34cd25b8976663b25c232771f4ae0673060e1
SHA512 1e686da80dbd66cdefdfdc1a8b407a85c9430896fd5b3593a381fdbf208973b02ccd9407f29aac4f686f92810132234c90d16e2925b384379e2f1ed49e64680e

/data/data/com.xzwt.lhyr.lkce/app_mjf/oat/dz.jar.cur.prof

MD5 4d9856fdd4b981800bf03f2f1b3abe3e
SHA1 15c445a58aef4f69ad9c9ab518fb907ce9f55c3a
SHA256 2a7256c915ca6cbfb3262a259ca3d6d2cc43ba47d437905823755df57064eb18
SHA512 ad4b0ca49594c569e605ded7884563dd681814afc13e25d8b76144df5e738610076121a0b4be2f5007f049cb9f5acfa77fdbdb76440964affd7f25b2a99e419f

/data/data/com.xzwt.lhyr.lkce/files/.umeng/exchangeIdentity.json

MD5 e4ad566f8d582a93e3e52d8f2293e977
SHA1 7631a381ab024d983aa8824a02dfeb61ef9f92f4
SHA256 5993305603dc4abb695f085b65c3b0da4981774ddf130bb0393994a798cc37a5
SHA512 b26365bab69ae3a6f61a7b5d81cb98600daf6aadeda9cb39afc1dc6a8463ff02b073d260dc802ff43783b374961daa18a9fb9faf720157ef94096cb4f89c972e

/data/data/com.xzwt.lhyr.lkce/files/.um/um_cache_1718546522806.env

MD5 cb7fc781054abeef2861d2fb96bec4e1
SHA1 94d7c9c5f00a358e6c5cf67d9e19c9dcc622f26a
SHA256 6ba654c88f33dad76f77458b572e1defa1f2ae1373808cc45fb6b50fe16faeb5
SHA512 15d23f98ccde93fa0df5970909e9743a55ec7d54ffebae42ae16fd386df725e99f439bee425e6cc80ad7f433783bbe933487d7e8ecf3351574b10d6462b41735

/data/data/com.xzwt.lhyr.lkce/files/mobclick_agent_cached_com.xzwt.lhyr.lkce1

MD5 11a9e5d15d06f4899f269e866e2ee62c
SHA1 821295eca083c7cef16e9fe2c1545ea8b0658bb3
SHA256 154fdc16956b68f047a4d43363a157d9079adbd984a89dd1c91cd86b033d7dd9
SHA512 0e8445d817e6d2eb81e47e148c9130baeb799fbb4c4d78c6be5b88c6bc039ebf272773c5f600cc9fedcb9254835526303e3c1bb70e550b37655b296a2a255016

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 14:00

Reported

2024-06-16 14:03

Platform

android-x64-20240611.1-en

Max time kernel

178s

Max time network

187s

Command Line

com.xzwt.lhyr.lkce

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xzwt.lhyr.lkce

com.xzwt.lhyr.lkce:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.120.12:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 172.217.169.10:443 tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.120.12:80 ip.taobao.com tcp
US 1.1.1.1:53 android.apis.google.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
GB 142.250.200.46:443 android.apis.google.com tcp
CN 59.82.120.12:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.202:443 semanticlocation-pa.googleapis.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
GB 172.217.169.78:443 tcp
GB 142.250.179.226:443 tcp
GB 172.217.169.42:443 tcp
CN 59.82.120.12:80 ip.taobao.com tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 o.pmuro.com udp
CN 223.109.148.130:80 alog.umeng.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 59.82.120.12:80 ip.taobao.com tcp
GB 172.217.169.14:443 tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.120.12:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.179:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp

Files

/data/data/com.xzwt.lhyr.lkce/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.xzwt.lhyr.lkce/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.xzwt.lhyr.lkce/files/umeng_it.cache

MD5 19f3d71202713d8417a7989a1beae4cd
SHA1 ca3f1a66bf578041cc34d35782c462730f2d002f
SHA256 8fb9a408bdc1fe9d4f37c671a42c3d48b91d89da145448a8767f262e524a4a9b
SHA512 79e192b0d1a1d63ab9e5b63117eda35ad1e5527abe5c9e800c2604e724a4d5ecd90cff0274fbc88f160477d70f23a01701c1071b42483f9809dced1949383702

/data/data/com.xzwt.lhyr.lkce/files/.umeng/exchangeIdentity.json

MD5 88313316017c4d51d08e9dbba4fc704e
SHA1 fce641cb024557aa044536501796c347a1f7529d
SHA256 aae6fcbec00ea473083c4c504f7fd1fc30e84e8d435f0b8a233a2665ff8c9e95
SHA512 9d8dca0948bc6f85b687131891a391cb5951dce1e5203ca0b5a233cc84ce282911f66914bf308a2b3bb5e4aa28753cf9eff4f40a59bddecf0378a48016c3274f

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 cb33572efbe4df9b91b2f03c33ff9be5
SHA1 7fe17e2139e304579aa6d7716ccf50e0c8e0ce70
SHA256 a79db50614248019d1e946ddbbce154d2db59a1f21d52370ad8179330220fadb
SHA512 48e8bf3e6ccb444ae8034f096e6b91883a4da33910423e5d88c3b2e9d66dc7cce43e3969a1ca8d1ee4ef3ad54a4be8a24afe8880ab8716b5df6a0b5be81e92bd

/data/data/com.xzwt.lhyr.lkce/databases/lezzd

MD5 dae68dcffc3d522a79f98ebbc3b6d457
SHA1 6df5dce9a50f12044a2d20b8d1742ae47b82ee03
SHA256 56cf91ca198812e0ef9ba4af0e96c08a32e24c917bcf2250bdebdfd7fd6f5286
SHA512 23b76f988399e9c9e4f5a7e8d19ecb765abdb115b0beee35f8ca9d221bbc5ee79f0152fac4261cc91eb9e7f874b5c6e9bff2dbb1812d31412d506cf83c16adcd

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 0ad7de0d67e2eebdfc1eceea30fa141d
SHA1 999a94c8315608a56d17fe3604d07d450f4144ab
SHA256 c3d924f4ce39b53e4625de8bd15365f4116eb561c14e22e80785e3bb1854db5d
SHA512 c4eac7527928b39fb5c00a0e6187832d62e9d5d036f4eb5d0e6c8a72d4bb710f03323927595894fb6240ceb5efe5e53c572d2a2486ac94af809c524e19655d4a

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 3583d32393068bc7478609c5bfd4e9d4
SHA1 fb93413117573c39957dd7a90c5f17f6eaf48f44
SHA256 72dec871ca66264cea31db788ffad93f6370319fc658a76140321b885a3936e3
SHA512 0ac9544d9c58d50f51b3521c91a96b94d8b5d4c9ea2a9078d29f600c4fd55652202169c3ce329cc1f0e96c3fa29fe7706b952f561ae497d717985ae49fe86d61

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 419e7ec7e9624792e56037698c623e2a
SHA1 f9920af17ebb1ea6867b9e58c802dd0c55bdf90c
SHA256 d1e844f6ac85e76d38578fe0e96ddf1b921a7e627bb0089b934e301baf27a625
SHA512 618fc134af0ec888ac4119759c7b2ab4217a5045b0b570c79041acb2ec6520a48e07e0c8a245e36d29a2c26c86bfb95eaff662fb727df576987b223a75186278

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 73ee8bb34c9493cc7476f91206ca172c
SHA1 8ab52e9cd3b20d34397b8f30d8a26cb6e40a2002
SHA256 14f13077b80d0fe0e11004d346f9ce5be693201642dca2434b5869e34346d321
SHA512 7debbfab8ee9f977ff47bc1d03412d9838e35c90e07d5d0443d6fd1349edee2320ac383939dfe1c1695684e71edeb44cd13839303a42e54202b115e06ba73ada

/data/data/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 6be31bf2460aa23e05557c6897d48269
SHA1 c60c6cfca88e70f4323e6e016522afa795a0815a
SHA256 d04d18ac38ba4081ae0a95a8164d7395123a060a4ec139375db08fd3b045484d
SHA512 71ba33428f436522107390e98a8ad130650ae4a660f834e4b7680ec35ae8065710be649b5ecb46e8edbd0f6ef0700dd76609dcd69c901b596b3e4446fc89012a

/data/data/com.xzwt.lhyr.lkce/files/.um/um_cache_1718546474425.env

MD5 46cb0787c976a921fca7db86461872ca
SHA1 e62128c4ae88c503ea1e120885ef2e1887f46c6f
SHA256 1dd4b6211cdee74eca8ce95665e1113b5b7bec070390c8c4caea5f0a7a1983c1
SHA512 448b5f69d6e6c2a24c0d3b6f22be7ebdf21b9677455005d0aa5f16661d0a2ea15080b2a4153b9c0095fc602c389ab14673e1fc226c4a28ff8cb530bcb0210c32

/data/data/com.xzwt.lhyr.lkce/files/mobclick_agent_cached_com.xzwt.lhyr.lkce1

MD5 8470ac503fb3e6cbe26dced51943c9a1
SHA1 edee8f9daab1bbdc31b7ed7b044858552ee21f55
SHA256 5d0fca5725117d6c46c7b703ad2d149fe88e5adf98bc16cf6d3be916187f500d
SHA512 d910c580532ab153a86f361b50cf8fb679a4ece81763ee8038830b74ea8a8f93259624c7ca3597eed0be95e8d334d7cd5dae69d9793eeaf0e0e653754678ecb2

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-16 14:00

Reported

2024-06-16 14:03

Platform

android-x64-arm64-20240611.1-en

Max time kernel

178s

Max time network

187s

Command Line

com.xzwt.lhyr.lkce

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xzwt.lhyr.lkce

com.xzwt.lhyr.lkce:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 alog.umeng.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.121.163:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.121.73:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp

Files

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.xzwt.lhyr.lkce/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.xzwt.lhyr.lkce/files/umeng_it.cache

MD5 49b9831ed76565000a6b4bea771346d3
SHA1 b88b50181b35a5b6f59e66fb02bd910d10adb884
SHA256 c506d9dd8838a8e5a8157020200ca9a163b98ed6aff0bf3fee1c73212f92440f
SHA512 f95bcf9b6c1cf2b1e5224ea78c6fafa12cb9ceece89df35686d2d602d644920f72a3b8ea6d1087bdc33526e5886e034c3f98b9b17a0e625c83daed59cdad9c2e

/data/user/0/com.xzwt.lhyr.lkce/files/.umeng/exchangeIdentity.json

MD5 e5d62a2ffc698e35289397fcf0b99b23
SHA1 54f5326d5ce65949a3a501993b0e7d4b930787e4
SHA256 6d7281139883f0d0bd2fc0b4befe4389d37193753f62a0e4235e3ef9d7e6658d
SHA512 e53b9e800bc597807eaed5bd48c1e3726f9149333d5ab582e4fe7cf8bb1ac9cfc2074897650ff5e885fa6958621c5f9fb9f903877aaf191aa814e5186ac7508e

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 36f2cc2ff6f63118963c1e97cb241b29
SHA1 bb6d59783f86eb5febda96ba34ad56f6205fcd85
SHA256 a84901bdb90c3a0f984fd98e43f5fea8c73c9416d4b4b54fdf9ff8c8e253ef8a
SHA512 644e5a75c356dd7678f476145a8559e713df851892271ca8544f5eb209e3c28e9a87bada045170cd5cb5bfa6af85bd460e58b779a30c2cd70a5d102384d91372

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd

MD5 fdb8a92e5060ce104e8f0faca55a47ce
SHA1 270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256 194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512 ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 e6dbeb9cda76a42cd6538a696d895106
SHA1 d07157b650af690758e6e1998648f48cf7aba709
SHA256 6e0871143b423bb8ed7011f9246237380bb9ba62ffd1f0bfe293abec360046ea
SHA512 e4a478d76fc2d37eb6738abaae5fcd098d9f4a0fa109ba70c891ef706a2ac69f10bae00e2dd51b8c6561550906b794f35630b614874a283bbdfda9570aa5582d

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 c38ac524a3e93e7f345015e874e0d9b1
SHA1 6e52ba235a6d221fccadd481d172bb2f391c802f
SHA256 84c9e68921e4bfa2b6e290c8812039a4e8990c8c2d474a7c1c94f48903320e3f
SHA512 ffd14afcacd35aa087dcbba3d91e390412a36f012aad6c4aaf79a67031074bfd86aed2f08f30557dd241f9cbfbb34b03b60f09256f064421b12840165b9522f1

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 8c4da1d777083a05e28842e4a316c90c
SHA1 a61d76b890dac4aff1dcb08204788bace6a4414a
SHA256 45d09250d082ebc6c7eadedd1269772a55c5db5d563e6ed014c22c2efccf9608
SHA512 d049c87b95c67dd6d185fa1f41599d4c61c31bd4464f87f8c4a71204516307d8901e175b0c8ce5991baab0427a53b7b7d83a4db358c63bfc2c1d307714c9be72

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 29eabd37cfccae2271432b7e0665e270
SHA1 70fc3e1679ea159c7bc5f525764308ef65b03c88
SHA256 53feafc3f141ccd73a94b52368177fdb686a8f40717db24b78fa05e36c7850af
SHA512 ef418c12739cd181f82b7fb0c6208f9db8d1c894c7b8446ee414812aa18e2a876212937f20789d0614eaff91c8c3a02f88edd08dce7f11a73ed033f720d4b2de

/data/user/0/com.xzwt.lhyr.lkce/databases/lezzd-journal

MD5 0279c79cfc982ba87c0f799ef807a9d1
SHA1 9c52e8289163d3997f026b40bbf634f9cc7321dd
SHA256 6de5087b0eeb59fcecf156c63f85eeec5e4ba1935fc9ae1dc0b8913ce0936202
SHA512 dd148b68ac7f1ede0fafeca70bcc0657958d8f07568f298f14e54846f0c1e1ec187e506ed7864d831191be4f96aead4bd15ef5873039d6c44eb767457cf18ce1

/data/user/0/com.xzwt.lhyr.lkce/files/.um/um_cache_1718546480092.env

MD5 619c4cdcf45b590e8d51b2494976d3d5
SHA1 005929fc179f929785e6720405213b0141b166f0
SHA256 cd68f2a8986f048d188186e8b0f05f7e529eb5e67e97f0ffd4fc4ea790eb0d56
SHA512 3bcaa39fc941515e9bc518c8134c70d2aa2de322551b03cbc9b2c9dc10eb681f6e5d9bfc4fcadd75c7f484cce7ec5b2de395436e5f075a40c23851f0c61d4316

/data/user/0/com.xzwt.lhyr.lkce/files/mobclick_agent_cached_com.xzwt.lhyr.lkce1

MD5 748d663c4b953404e7bc14815b41f8b2
SHA1 b70daa3f0400cc7e25c546a516f37ae366a874ac
SHA256 a4fdbd3657bfe5b8065ad4450df5760b90ff11f2cf89aab4328c5f7ccc88b8dd
SHA512 e86bb281bee13ed704d1294aa956699e2dd89d7a46e204654a05ed5a0bdb57b992c55d22901f5df9a626f5f667c5009d3e9c42d9760e3ef2d859bc83fbc93042