Malware Analysis Report

2025-01-19 04:51

Sample ID 240618-k7w6es1dlm
Target baf7ab9e15c909bb7845be1c6286ae0f_JaffaCakes118
SHA256 8f4d0b466aa44e0797fdf863eb7af1e637ecd788c93e6fd0eb4396565530d91f
Tags
collection discovery persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

8f4d0b466aa44e0797fdf863eb7af1e637ecd788c93e6fd0eb4396565530d91f

Threat Level: Shows suspicious behavior

The file baf7ab9e15c909bb7845be1c6286ae0f_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection discovery persistence

Reads the contacts stored on the device.

Requests dangerous framework permissions

Queries information about active data network

Queries the unique device ID (IMEI, MEID, IMSI)

Reads device software version

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-18 09:15

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to monitor incoming MMS messages. android.permission.RECEIVE_MMS N/A N/A
Allows an application to receive WAP push messages. android.permission.RECEIVE_WAP_PUSH N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 09:15

Reported

2024-06-18 09:22

Platform

android-x86-arm-20240611.1-en

Max time kernel

43s

Max time network

159s

Command Line

com.cc

Signatures

Reads the contacts stored on the device.

collection
Description Indicator Process Target
URI accessed for read content://com.android.contacts/contacts N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.cc

Network

Country Destination Domain Proto
GB 142.250.178.3:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 si.cc369.cn udp
US 1.1.1.1:53 wap.cc369.cn udp
CN 220.194.53.85:80 tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 699cd87bce3d53401d7311ccb4fc5df3
SHA1 c98c6826f6796005cf2b7d1310ca06f3d0d6aa3b
SHA256 d17cfa7a6786d4a0f012af96932c2ac9b30aeb501fe40edcd3b1f113ee4b48e1
SHA512 1b75778cb34ec3bb75ce23475cbc708baa5cc66edd9595b7bfe4d854a75e39296c5ff31168315c948d5c4860ab500cb46cb62bba2e32af4f18da443db20b639a

/storage/emulated/0/cc/setting/CallPictureSetting2.cc

MD5 86b336be6004420c4918484016d7682c
SHA1 20735fec3c9c4daa7741d75591462f67b3344172
SHA256 c31ce94ce1f79c7f019ea128995ffd29537428f29f2ab93408be796459cf1008
SHA512 1781816ec51ea90491df81b2c786157a85604dc59cfee657776467c4b3071f3f17ef3db57e8163ef7ff4f8633386270a211cb4de84eae15e0c08471752881196

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 1ecffa3e56abd71e1e88c545bd11a866
SHA1 14ab5be36c48c46eef89c6cb162b94040576a636
SHA256 cf360362231f7d0efc152408d9ac790d6c6861c9a45727808f5556d033236b8b
SHA512 9d79564a018a6a5eb51c97f93809f97dff14d8d84159bd88016c7a29ee74f2703f3a0befbf4ee5935e315bcf24d5b1ced1ccf780e575a847e13228253aa6a524

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 3cd99a5e51b9675c8a8f052a9c2569a3
SHA1 3133637e70b6f533235fae93bc7fb18e4d5f2565
SHA256 1e1d7daa2eb3d6840f512d8a37955edb4546d4da29a2670caa27a3c040f9da46
SHA512 f132c082ef1e24e9ce7a8e79352fb9ee519a8da073fc2ad3f0e5e5f7ee3242386d5198b98a95b03b18a71aab43e34bb5497abffd04e2e8e395997522e2e4ce30

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 e05e6d3a45921e75e47a22e68f5dd028
SHA1 af7a8a85435504d4192776033d18260842540259
SHA256 936c15a6d197d76210683d3c5dfe0eaa87bac89ce288cf50da9bdbfa8ce76cad
SHA512 acb5be0bd209e453cb4c1053d15195fb220d2d99087a40381720eff910ff28e4994e60ef2a2dc17db2ae728d76c4add9f7d9ed0d121a9fd0bd4e74a6e906adae

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 298cd2825ca537a2670c1bf78084f8b7
SHA1 599ea0c2216729de994ed7d708c7b08e3af984b1
SHA256 3d1ea9722f4b847eabcfc5997f90fb2a5fa33fdd6198f8925cf38d9d1d2fc9f7
SHA512 cb684e0fbfc748f0b1626925987e0f5feda79d16fa54dc9c543245138b06a2812b9d2d820b6b0cbec6e3311560634b1f34b4c1349a0e8c324b8511ec38d8963b

/storage/emulated/0/cc/setting/MobileSeg.dat.tmp

MD5 a90b99ca65e550aba27ad24d3b18f69e
SHA1 a958eda542b9ed4beeffc3e55f32d18403cd9f71
SHA256 00dbeeb7ad7a9867839e7bad81efeb5a9860dda1764e51d5c6c35b0ca2404e4b
SHA512 7ca3f4e8cdaf4c7eecbb61e3a6f5927d35b674f56c83d496d170f37320e0812b15f9a5f3cc35d0818aaf7e0bc331b5ad010b6efa69577affd553228ce357ceee

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 dc9ff11c2a6cf99ecde14c4edc918307
SHA1 257b123d6ba0eec3c4fb7835fbde2bdcd2c5694b
SHA256 0e176ddb410a9193aae7e627bfae59d08695822ba1f52d385ffbd51c9517cd16
SHA512 f68070ee24e95a4185862b069317925698f39bf4bb8cfcb47d0b448b7f5ccc92304ae1e330275bfcc153797e1aa0c16628269dfa1495d5a775a2ce6fee26e47e

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 82f6c11d2b7f45b6c01ab62f42037074
SHA1 ed813b7a66a06d2c59a620c128dded39305f985e
SHA256 7bc92563587a450770d3ed006a41221ba4205a7013a930b125626d7b28d60eb4
SHA512 d1061b258d2d74626fe45687dcda81c45a1e06572e0756e3a6c486014c989ef4fa2e01fde2bf657f3240f376f3ecd9c9d259da1bc9f09d0730b682798b76e53d

/storage/emulated/0/cc/setting/PhoneSetting.cc

MD5 33293254492e47b33dba7b124afdbcb6
SHA1 8c60c28ec4c636fbaa8525ae0bb7a7db3068940a
SHA256 222fe7c86f9c2cd173ecf3b22e548ae04263db42c814f0fee19e15cd99f05f48
SHA512 25facbc96856b3c3feb719f49b4276d8d46778b55cbcc988f9d9b8b914e98dbe4d8b570e731881408d400654bb505b5103f5b3c2ad3ee58c9849e9587102db4a

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 43f40b13ddf14f243e0eb951bf29e842
SHA1 193c03eb51e520960fefdad67315c47c337c4559
SHA256 30829853d58cbff96125bf83c276556e12a00cbb95ff192ce73e6902d8402918
SHA512 3289920007b204b65d689e8d8957e0c286af50417a0b966467b06a8ebe086686ecead366b279f0e197a8712e4ca67b5e3f0e4b0b644ff8d2129f22a7d1147a50

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 09:15

Reported

2024-06-18 09:23

Platform

android-x64-20240611.1-en

Max time kernel

14s

Max time network

131s

Command Line

com.cc

Signatures

Reads the contacts stored on the device.

collection
Description Indicator Process Target
URI accessed for read content://com.android.contacts/contacts N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads device software version

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getDeviceSoftwareVersionForSlot N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.cc

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.179.232:443 ssl.google-analytics.com tcp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 si.cc369.cn udp
US 1.1.1.1:53 wap.cc369.cn udp
CN 220.194.53.85:80 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.179.226:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 0386a11ddf3418c3c4dca33e450d4258
SHA1 698453646367c32b5d535439db71b9ab013eae5b
SHA256 67c3f119014759361cba0af53b09029a4e1dc59d59ae245a1b51465500735ff6
SHA512 e66e719827771a39eeef3362b5c7d448492dc286a6d92175cb24df1665a88b7bd1628dd8aee1c4c81cb8131ed0dcd2ea19ef340a89de8970cbfbf9c6f96151d1

/storage/emulated/0/cc/setting/CallPictureSetting2.cc

MD5 86b336be6004420c4918484016d7682c
SHA1 20735fec3c9c4daa7741d75591462f67b3344172
SHA256 c31ce94ce1f79c7f019ea128995ffd29537428f29f2ab93408be796459cf1008
SHA512 1781816ec51ea90491df81b2c786157a85604dc59cfee657776467c4b3071f3f17ef3db57e8163ef7ff4f8633386270a211cb4de84eae15e0c08471752881196

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 b27fe12bc437d10383ba68eecf057aa0
SHA1 52caaaef70e43c66052036742f02934657806a07
SHA256 c2e3202d97d0be9e5cc81d1290a5dcb50fb70d4f5ebe23b8ab827af50208a040
SHA512 c84b99575c220fa7f05dcfc62dd89bfa99d3153b313bb3101e548d74f7a4bab1a63436d3f25f1e64ae2539472c9e0f118a914ef8d4ddccffac0f8315a80a0094

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 a6dadecf4515ee7694742088ee115154
SHA1 a9223f911cf148a7f3d8c26a18c7c276065bcda6
SHA256 6671396a197007ec5621d8dac911108b3b5733c3ed8b5f3981ce197bac22bc77
SHA512 04c97c7e1b78644f1905204c68a7679a1f8c78a71a048801ff8c467da34454a899d23ee2ed3d5942b1e5efa01806ecc11d4a60d7ad1898983e1d3278ffffdbe0

/storage/emulated/0/cc/setting/PhoneSetting.cc

MD5 33293254492e47b33dba7b124afdbcb6
SHA1 8c60c28ec4c636fbaa8525ae0bb7a7db3068940a
SHA256 222fe7c86f9c2cd173ecf3b22e548ae04263db42c814f0fee19e15cd99f05f48
SHA512 25facbc96856b3c3feb719f49b4276d8d46778b55cbcc988f9d9b8b914e98dbe4d8b570e731881408d400654bb505b5103f5b3c2ad3ee58c9849e9587102db4a

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 ca8e8a9893b83e88d6e3986f37138ce3
SHA1 9a61a48964f0bf10db64ffd547556dbaa1c9285a
SHA256 ccb66fc61db37c2d21e5e941c2f0ff80c65449409ac8d755c9fe09d9dcb6243a
SHA512 95b07f1e92514d91cb4442ad5faa3f192579b1af65af3aadeb9720efacc95abffe7eb00ba03534dcb775658e568cb08c0d8de82ea75e6c5db924edcd40b58b7b

/storage/emulated/0/cc/setting/MobileSeg.dat.tmp

MD5 a90b99ca65e550aba27ad24d3b18f69e
SHA1 a958eda542b9ed4beeffc3e55f32d18403cd9f71
SHA256 00dbeeb7ad7a9867839e7bad81efeb5a9860dda1764e51d5c6c35b0ca2404e4b
SHA512 7ca3f4e8cdaf4c7eecbb61e3a6f5927d35b674f56c83d496d170f37320e0812b15f9a5f3cc35d0818aaf7e0bc331b5ad010b6efa69577affd553228ce357ceee

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 fb32adbd30022716f9808498718b3c5d
SHA1 053f15f53c431bc1415bfe68c3a75edfeaf68880
SHA256 75fcd3506af78248d79f7dd32df24de29a8698b610bae7959a0fd51b6a41afcc
SHA512 f3236c0c4cda65318440d15270ea800d467bb2b91ca0ad31604e3986d32d883f95d72f7624d59a3925d5abe87a40dc5e5cbf071e82205fc792b747865b8b88ab

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 71351866d5749f5cf3699f951dd5f5c7
SHA1 2b718b7add9a0549b0d0935f5664cfd7aa32bac7
SHA256 4a68e2be48b39e40152e094a576eace84197fc759b7969a27ab4d6bd046444b5
SHA512 469312f7395ed93a09debf143b5bbfd787ad953fb2e232d93fa6183e06308220b9cf0f4aa485c693020807e3843630e5aea599f1a5db871b3d87b07bd02972c8

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 43f40b13ddf14f243e0eb951bf29e842
SHA1 193c03eb51e520960fefdad67315c47c337c4559
SHA256 30829853d58cbff96125bf83c276556e12a00cbb95ff192ce73e6902d8402918
SHA512 3289920007b204b65d689e8d8957e0c286af50417a0b966467b06a8ebe086686ecead366b279f0e197a8712e4ca67b5e3f0e4b0b644ff8d2129f22a7d1147a50

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-18 09:15

Reported

2024-06-18 09:22

Platform

android-x64-arm64-20240611.1-en

Max time kernel

45s

Max time network

167s

Command Line

com.cc

Signatures

Reads the contacts stored on the device.

collection
Description Indicator Process Target
URI accessed for read content://com.android.contacts/contacts N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads device software version

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getDeviceSoftwareVersionForSlot N/A N/A

Processes

com.cc

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 si.cc369.cn udp
US 1.1.1.1:53 wap.cc369.cn udp
CN 220.194.53.85:80 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.201.110:443 tcp
GB 142.250.179.226:443 tcp

Files

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 0207a97373ffb490dcaf38e5852568e4
SHA1 d8b0d8ec055f5166556d02544cb4bf87400ddea0
SHA256 b0eb061c18ae3dd03bcf89545dcbebfe407cc799433328fcada446c33c9bbc2b
SHA512 8298377633bfdd8cf971109913e9f0f1a22cf1adacb8932731133ebc6fdf84388cd67e089b9c7308a30adbfb008d018161699e298847139913b7492f12472326

/storage/emulated/0/cc/setting/CallPictureSetting2.cc

MD5 86b336be6004420c4918484016d7682c
SHA1 20735fec3c9c4daa7741d75591462f67b3344172
SHA256 c31ce94ce1f79c7f019ea128995ffd29537428f29f2ab93408be796459cf1008
SHA512 1781816ec51ea90491df81b2c786157a85604dc59cfee657776467c4b3071f3f17ef3db57e8163ef7ff4f8633386270a211cb4de84eae15e0c08471752881196

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 2a44ee87eebf27c171b0561f595fc166
SHA1 5909fe48b0cb2a8a6e50393cc998f62ec4767947
SHA256 340c2add2997a1350761b47b0ed2e78fdcba9d194ae418322bf4f059f27c0fe6
SHA512 074596e636ebfa2ce3763a21aa449f82bf1b47ca4b986b6dc655fae8796a02051da4794e14d75e6799969fc28d5464032ecd542f9759a41e3eeb0dc81ce25b6e

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 98949d66aedab11677d2ac7acf8844ea
SHA1 65c423cfae5f2b55f3e6f56177d76c0bacc8ef67
SHA256 7d6335d69a2aa5cb528a1b9561308d79b87af6d5735f3a12501226640f9323b6
SHA512 66d5982c3da2997bb956d2942965774257d6fd88cf82f2999c35c168a77d7e282c03bf24b9c339e96af9db2142ab85af3daa417e332c1ce35ddeac280a97910d

/storage/emulated/0/cc/setting/PhoneSetting.cc

MD5 33293254492e47b33dba7b124afdbcb6
SHA1 8c60c28ec4c636fbaa8525ae0bb7a7db3068940a
SHA256 222fe7c86f9c2cd173ecf3b22e548ae04263db42c814f0fee19e15cd99f05f48
SHA512 25facbc96856b3c3feb719f49b4276d8d46778b55cbcc988f9d9b8b914e98dbe4d8b570e731881408d400654bb505b5103f5b3c2ad3ee58c9849e9587102db4a

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 298cd2825ca537a2670c1bf78084f8b7
SHA1 599ea0c2216729de994ed7d708c7b08e3af984b1
SHA256 3d1ea9722f4b847eabcfc5997f90fb2a5fa33fdd6198f8925cf38d9d1d2fc9f7
SHA512 cb684e0fbfc748f0b1626925987e0f5feda79d16fa54dc9c543245138b06a2812b9d2d820b6b0cbec6e3311560634b1f34b4c1349a0e8c324b8511ec38d8963b

/storage/emulated/0/cc/setting/MobileSeg.dat.tmp

MD5 a90b99ca65e550aba27ad24d3b18f69e
SHA1 a958eda542b9ed4beeffc3e55f32d18403cd9f71
SHA256 00dbeeb7ad7a9867839e7bad81efeb5a9860dda1764e51d5c6c35b0ca2404e4b
SHA512 7ca3f4e8cdaf4c7eecbb61e3a6f5927d35b674f56c83d496d170f37320e0812b15f9a5f3cc35d0818aaf7e0bc331b5ad010b6efa69577affd553228ce357ceee

/storage/emulated/0/cc/setting/CommonSetting.cc

MD5 2076e08e44b3a60cbd7fe772c0704700
SHA1 280bce9fe2233f145173c6aa2924c0c269e6f4ff
SHA256 b66c7e30a6782d9cfd1d9c574dc8eee9b4b8248ce4ee409e5b9e534a0adb6e48
SHA512 3b5aa88251c528b9d2f0d585de953a4706f5ed7d591f3d69aaea2f5ee6f08cd7aa2e17af137273d1ac215c44da6bcf37a75cf42790f7ca5d92d709c9a96e4456

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 82f6c11d2b7f45b6c01ab62f42037074
SHA1 ed813b7a66a06d2c59a620c128dded39305f985e
SHA256 7bc92563587a450770d3ed006a41221ba4205a7013a930b125626d7b28d60eb4
SHA512 d1061b258d2d74626fe45687dcda81c45a1e06572e0756e3a6c486014c989ef4fa2e01fde2bf657f3240f376f3ecd9c9d259da1bc9f09d0730b682798b76e53d

/storage/emulated/0/cc/task/sendTaskEventGetSIReload.tsk

MD5 43f40b13ddf14f243e0eb951bf29e842
SHA1 193c03eb51e520960fefdad67315c47c337c4559
SHA256 30829853d58cbff96125bf83c276556e12a00cbb95ff192ce73e6902d8402918
SHA512 3289920007b204b65d689e8d8957e0c286af50417a0b966467b06a8ebe086686ecead366b279f0e197a8712e4ca67b5e3f0e4b0b644ff8d2129f22a7d1147a50