Analysis Overview
SHA256
01755742a3164eef8b28727f5bb37b4f2fb7b20d32c84232d624070d2c0d000a
Threat Level: Likely malicious
The file bb670adbc9250ed0ee160ef2a0399550_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Checks if the Android device is rooted.
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about running processes on the device
Requests cell location
Queries the mobile country code (MCC)
Reads information about phone network operator.
Requests dangerous framework permissions
Queries information about the current Wi-Fi connection
Queries information about active data network
Declares broadcast receivers with permission to handle system events
Declares services with permission to bind to the system
Uses Crypto APIs (Might try to encrypt user data)
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks memory information
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-18 10:15
Signatures
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows an application to write the user's contacts data. | android.permission.WRITE_CONTACTS | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-18 10:15
Reported
2024-06-18 10:18
Platform
android-x86-arm-20240611.1-en
Max time kernel
172s
Max time network
185s
Command Line
Signatures
Checks if the Android device is rooted.
| Description | Indicator | Process | Target |
| N/A | /sbin/su | N/A | N/A |
| N/A | /system/app/Superuser.apk | N/A | N/A |
| N/A | /sbin/su | N/A | N/A |
| N/A | /system/app/Superuser.apk | N/A | N/A |
| N/A | /sbin/su | N/A | N/A |
| N/A | /sbin/su | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries information about running processes on the device
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
| Framework service call | android.app.IActivityManager.getRunningAppProcesses | N/A | N/A |
Requests cell location
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getCellLocation | N/A | N/A |
| Framework service call | com.android.internal.telephony.ITelephony.getCellLocation | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Reads information about phone network operator.
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.sogou.androidtool
com.sogou.androidtool:remote_proxy
com.sogou.androidtool:push_service
/system/bin/sh -c getprop ro.board.platform
getprop ro.board.platform
/system/bin/sh -c type su
/system/bin/sh -c getprop ro.board.platform
getprop ro.board.platform
/system/bin/sh -c type su
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | get.sogou.com | udp |
| HK | 129.226.102.244:80 | get.sogou.com | tcp |
| US | 1.1.1.1:53 | mobile.zhushou.sogou.com | udp |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| N/A | 10.11.206.68:8090 | tcp | |
| US | 1.1.1.1:53 | config.push.sogou.com | udp |
| US | 1.1.1.1:53 | android.bugly.qq.com | udp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| GB | 172.217.169.10:443 | semanticlocation-pa.googleapis.com | tcp |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| US | 1.1.1.1:53 | android.bugly.qq.com | udp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| US | 1.1.1.1:53 | android.bugly.qq.com | udp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
| CN | 119.147.179.152:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.199:80 | android.bugly.qq.com | tcp |
| CN | 14.22.7.140:80 | android.bugly.qq.com | tcp |
Files
/data/data/com.sogou.androidtool/databases/downloads_classic.db-journal
| MD5 | 1b90defca07012677644f54d6a2d81a0 |
| SHA1 | 076eb4f8c0cdf45aad79e930d35d7212e418b172 |
| SHA256 | 60c91116c68ee37f5af6e1e7b9cbdc55de3c3e64f2c7ea00e27a5aa58786b27a |
| SHA512 | acb453b33f7d6f490056136be8aedc0c19b6cf1da0088239d9212b7ca77fc0e072e35d1a7e4ab9f925cf6ea02b3f778e593a0923c2c27cbad4678f6b6dc52f0f |
/data/data/com.sogou.androidtool/databases/downloads_classic.db
| MD5 | f2b4b0190b9f384ca885f0c8c9b14700 |
| SHA1 | 934ff2646757b5b6e7f20f6a0aa76c7f995d9361 |
| SHA256 | 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514 |
| SHA512 | ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1 |
/data/data/com.sogou.androidtool/databases/downloads_classic.db-shm
| MD5 | bb7df04e1b0a2570657527a7e108ae23 |
| SHA1 | 5188431849b4613152fd7bdba6a3ff0a4fd6424b |
| SHA256 | c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479 |
| SHA512 | 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012 |
/data/data/com.sogou.androidtool/databases/downloads_classic.db-wal
| MD5 | d7f321507911949887edf8b42b44b6af |
| SHA1 | ab2533915a648f41278177bda453b12994a3f2d5 |
| SHA256 | 1ba8eb47fc626fc4e007517e586e03b8b2d086f7269766636b77d3613c062f18 |
| SHA512 | 0fa92859eddc2571be2d2a07780ed5da72450302210e8734bf1567cca9f10bce888b3826c3f30b3c1ef299f17dc787338bf9f774d876f27e005b5465bdffbc51 |
/data/data/com.sogou.androidtool/files/file_log.txt
| MD5 | e1fa811099adce7742a7b2118a2fbffa |
| SHA1 | 2f230a41189cddba9db22b6874f5cb6a9d8e2f81 |
| SHA256 | 1a889b06893ef7ef8caed589a6be9cc958669616f01303ff0089b8a447b317e7 |
| SHA512 | 53e9d3009c0c6efa87cc201bc3a209d7db43f9fee86b6f523256b5b3162f1975cf926249edcd9b45ed0a43a7c061ef8e6b0cc1bd1d0d6ce7d57458d92e0a1522 |
/data/data/com.sogou.androidtool/files/file_log.txt
| MD5 | 078ea22edcf3907db1da7ae9db089539 |
| SHA1 | d7cb163ef1418fa52d69f4af6e2ecb9c10a9f480 |
| SHA256 | 0e60627f3a58fcc31ae2cb4c0506417e370006ca78e33c2dfdcc8872c5aaaf7d |
| SHA512 | 111a73ebd3e5aa67e44c0a8d2f109978dc3c5ec0b0bf4ba306b8b9ef4cbbf21e2df7caa67c302263b637a63fc3c230348ef223f1fc5563363abd00ea80451ff4 |
/data/data/com.sogou.androidtool/files/file_log.txt
| MD5 | 6e09b2f688e45f8a9b95ca0951a83c7d |
| SHA1 | 8b53d2d7742c4ac4d8b98c160a7f58df77e61d29 |
| SHA256 | 408131b62e789cfc1a2c11d1ad001e9eed4bd0f35d145395878d08425302267e |
| SHA512 | e76405e3f9bd806fb6f38eff7e042406dc643f1eda90e4e01ac920031bcb45dcaf516cb7df2d7cd4797b1d0827287d7f48ecd052aec10eaab089a97e72e9a70b |
/data/data/com.sogou.androidtool/files/file_log.txt
| MD5 | a83f28acf7ab63e4d937d8535c99c7a2 |
| SHA1 | 2b3fe2ced56985d5bb0e0be943787cf28361cd22 |
| SHA256 | ca1d6eb391a103fe13b8cbe85110cc96421bf0a4877e7416da7ad737ab796659 |
| SHA512 | 006021acd8a252f248809714f84cec408a3100c59c534a0effc98e28473b6bb27497e630c496482964c9c4bfb59f9430a6163eb222bf4897be0c5b199808c838 |
/data/data/com.sogou.androidtool/files/file_log.txt
| MD5 | 437544e8643a15c7c48dca05345f3f2e |
| SHA1 | 9758aed9e9fd55cfe4ea055cc1c38cd68a59a02c |
| SHA256 | 53c68bf861fb6d50f4ac089cb450f221f8620675a647ef9e7764ecbcae69883f |
| SHA512 | 48a695a048665d3382af3113366220b2208123016473bb14d1f317236a712f1e33cddca490f272bce85c160e1634ff5c3530ca63213ed73590a1e7c1b20519e7 |