Malware Analysis Report

2025-05-06 01:31

Sample ID 241103-z12vnavfpm
Target 8d8690ae003b6a0246da7ccd19bc27be_JaffaCakes118
SHA256 ecb81af73fb4ed31194847f301d0174581884355bd679719150df9c62c59f1bb
Tags
banker discovery evasion impact persistence stealth trojan collection credential_access
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

ecb81af73fb4ed31194847f301d0174581884355bd679719150df9c62c59f1bb

Threat Level: Likely malicious

The file 8d8690ae003b6a0246da7ccd19bc27be_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker discovery evasion impact persistence stealth trojan collection credential_access

Removes its main activity from the application launcher

Checks Android system properties for emulator presence.

Loads dropped Dex/Jar

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Obtains sensitive information copied to the device clipboard

Queries the unique device ID (IMEI, MEID, IMSI)

Queries the mobile country code (MCC)

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-03 21:11

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-03 21:11

Reported

2024-11-03 21:14

Platform

android-x86-arm-20240624-en

Max time kernel

148s

Max time network

131s

Command Line

bright.view.land

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Checks Android system properties for emulator presence.

evasion
Description Indicator Process Target
Accessed system property key: ro.product.model N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/bright.view.land/app_ttmp/t.jar N/A N/A
N/A /data/user/0/bright.view.land/app_ttmp/t.jar N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

bright.view.land

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/bright.view.land/app_ttmp/t.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/bright.view.land/app_ttmp/oat/x86/t.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/bright.view.land/100classes.dex --output-vdex-fd=43 --oat-fd=52 --oat-location=/data/data/bright.view.land/oat/x86/100classes.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 api.wallpaper-sp.com udp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.201.110:443 android.apis.google.com tcp

Files

/data/data/bright.view.land/100classes.dex

MD5 abdef17ba4f14424b320d595b75dd5d0
SHA1 d9d857ff7d8d27b46ef15c36f1ddc446de6a65e5
SHA256 b1e8ba53201c08f510930bf2dd7bf9a1c5ce7c83220c31ab4249c37123551a55
SHA512 e048a6510d619bffb814cb1c6725b540fba2c9bb01e117c227e04b92d56c8f4711f82b6a63eb43796c4bea941ab2284f8eb7d48e394ed79e375dfe59188b7e25

/data/data/bright.view.land/app_ttmp/t.jar

MD5 e3447d5435bc33cb03183a57f3474f1e
SHA1 13b41650892f79bff94f3edf8689c3218ba962d0
SHA256 8eabaa1e5b64a753f5aeeee5e02ce584ab8e65c5edfc5e3bdf38f25462024dc9
SHA512 e4e7906b57056c413942ea3f5fa91cf3bc5f508a2e9c8273524c0cf84d7189f26b770f0130f57218ecba8982ac337f46a6d11d10dd8f8dc4f5f0c0fa02447ab6

/data/user/0/bright.view.land/app_ttmp/t.jar

MD5 4e1e6aa783bb8974b1436f0100156de6
SHA1 8d2d20dbf86960783c889dd9834e281bac850642
SHA256 58665fea32655b49869f9f7e6812f36906cd75dbe4af3f1d497e9bdeaf33fc53
SHA512 0a45ddb1269a3cd8a789ce3b9edef67e69c2968480938aac76e9e975c4cce049a42ebbcf0cf4058eef117e1041a1e7a8f15d504c5a9ca95b1b3d014ca91aadbf

/data/user/0/bright.view.land/app_ttmp/t.jar

MD5 73b590f8bfdd3d17d710d7b4969592e8
SHA1 8b211d7488ba8023c2982d2bc3bb71405245d01b
SHA256 d6901db366b8f33db6af0d33225c19caa6723719264fafd52cda172119e38e4e
SHA512 7e1a5a6b97e7b3b927ac88749dfb0a59e87a00f27693e0c7909d6e6130696f5bc3bc1d26bf5de480ab14550a198c3a3cab8ffdc59cacb8cf9f2ce109ac67487b

/data/data/bright.view.land/100classes.dex

MD5 e382fbc674abe5557b602ef41d4f943c
SHA1 a0f559a0a2ddf963dad58832c01354fcb9ecc9b5
SHA256 fccf972e2d621823834cd8ed4ad18ce319a48d0e1427843d90af828c9d1d797e
SHA512 a8891cb7a98138228a7296e0f62ba4a9ee2ea53075a99a54e675cb9d4e92da038259870c445f3673b18b7fc56d01302e3e848bd7ad49139bf9b5727774f64594

/data/data/bright.view.land/databases/bright.view.landb-journal

MD5 eeb1d4842ba0d19bd54dc29f16dc11d3
SHA1 7a0ef0fca72eeecc39fe7c753bfff2141c06ef33
SHA256 eed19fd21cb3999234dc0eccf2c9dc8447826434a4ad1d4052da7a4a3d41b859
SHA512 4b2551cae0190d107a4b9029490500821967364d559992db5e4f2707cb90ce012c7e9be845af2c2f9818c33cd449cd29ffecedb1b9cb10b978ebb8209ab6e106

/data/data/bright.view.land/databases/bright.view.landb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/bright.view.land/databases/bright.view.landb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/bright.view.land/databases/bright.view.landb-wal

MD5 33cf3daba4304baa6484f9a983689249
SHA1 a9f6e3ccab63ff4085d90d166cac884171c9b858
SHA256 a71f64d22c81ce2b6d30ea4564aaa7f7cd9c08d5399d48d71222dd0e01eb2259
SHA512 df57b2aee3d8790f2dce5c53ba652d54e781641ac997af3b213b3800af0384784a01b6bc7320b06c142369a4ea3ca4f9035302e2681adad1978bb14dd221f874

/data/data/bright.view.land/app_ttmp/oat/t.jar.cur.prof

MD5 f0eb94bb93a98b81e7be4c82402de9a1
SHA1 019d1f2f91b0546b8c2e541a0277cf6d6df3db9e
SHA256 fb84252f79f8df1cc204e3262314250eb47bfd16d6fcfc05beff09d20d1c448d
SHA512 99cf8a20ccc0d96d762489d90cc716fc6e76feede7f6ff7c244ada28c152e57aa0dbc2174140c264c5dbee225801b6f88ac8155ef9af078cc8108e176dd0f753

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-03 21:11

Reported

2024-11-03 21:14

Platform

android-x64-20240624-en

Max time kernel

148s

Max time network

154s

Command Line

bright.view.land

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/bright.view.land/app_ttmp/t.jar N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

bright.view.land

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 api.wallpaper-sp.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.201.110:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.200.34:443 tcp
GB 216.58.204.78:443 tcp

Files

/data/data/bright.view.land/100classes.dex

MD5 abdef17ba4f14424b320d595b75dd5d0
SHA1 d9d857ff7d8d27b46ef15c36f1ddc446de6a65e5
SHA256 b1e8ba53201c08f510930bf2dd7bf9a1c5ce7c83220c31ab4249c37123551a55
SHA512 e048a6510d619bffb814cb1c6725b540fba2c9bb01e117c227e04b92d56c8f4711f82b6a63eb43796c4bea941ab2284f8eb7d48e394ed79e375dfe59188b7e25

/data/data/bright.view.land/app_ttmp/t.jar

MD5 e3447d5435bc33cb03183a57f3474f1e
SHA1 13b41650892f79bff94f3edf8689c3218ba962d0
SHA256 8eabaa1e5b64a753f5aeeee5e02ce584ab8e65c5edfc5e3bdf38f25462024dc9
SHA512 e4e7906b57056c413942ea3f5fa91cf3bc5f508a2e9c8273524c0cf84d7189f26b770f0130f57218ecba8982ac337f46a6d11d10dd8f8dc4f5f0c0fa02447ab6

/data/user/0/bright.view.land/app_ttmp/t.jar

MD5 4e1e6aa783bb8974b1436f0100156de6
SHA1 8d2d20dbf86960783c889dd9834e281bac850642
SHA256 58665fea32655b49869f9f7e6812f36906cd75dbe4af3f1d497e9bdeaf33fc53
SHA512 0a45ddb1269a3cd8a789ce3b9edef67e69c2968480938aac76e9e975c4cce049a42ebbcf0cf4058eef117e1041a1e7a8f15d504c5a9ca95b1b3d014ca91aadbf

/data/data/bright.view.land/databases/bright.view.landb-journal

MD5 3dd74c27a2393a581183f4a243708e39
SHA1 796dbfe6c9c3330f06752ebcd101fd32c1b87a88
SHA256 94c619c6b919bee4c1d636490783768212f0f1b65891c32a2d7c49e6d42b0510
SHA512 724a012c838bc3994129969b97dd4740395fd806f0eb106073fcba92b4768d663eefca96ffc5a59ce3522581e68e50251eb7966e5c22103bcd4fb39069e82cf4

/data/data/bright.view.land/databases/bright.view.landb

MD5 2558176b0aa970d391fad5d0f43aeced
SHA1 6bae2bfa2c69b0dcccaf0acbddba634715ddd588
SHA256 743750b4eeb700be70ce50b8b993f41dc9bc3ffcc6b28a76af2a84b3cbd40a68
SHA512 9cdbea9ac7257b322f291f0ab345bae27ad569cb648dcd962bc5e857e5eaac2dfa5faecfe1c8252e8d87af63550610e52a6788dc77254f0f6e35619a21ccd249

/data/data/bright.view.land/databases/bright.view.landb-journal

MD5 438ec7f36be671a2160ffed91fb62b89
SHA1 27c2e819aba3a999f13bfec11f674f77f63674ad
SHA256 ac9f5b05d72b0c6cd888c004c276e789d78f4865781ecf7213219182a05b9c3e
SHA512 ff7188d655bcd2e5bf9577389cc48ea8170f6792337b1abe0f499875f7a8d48c19a825cd45c1f4701572c1f72dfae7aee47bf5a555eaaa5e314357b4aab71fa8

/data/data/bright.view.land/databases/bright.view.landb-journal

MD5 8283e81dc0c9ddc699e77013a626a888
SHA1 ede3c019bf04deb66f598d1b04e22c58eb07c9c4
SHA256 03dbaeaf18403ffb8c98c6bdb9644309f746c387a739fd9a5a87d4ed376842bc
SHA512 e445815db934395d26c8f8a443f08827763a275c6d565d74616ab42a532d9720809fb36e96b7a2491e6d5364e380814e0f92f5a2de89f6c19d451a99c3298b13

/data/data/bright.view.land/databases/bright.view.landb-journal

MD5 13d62126fe511fdec76c2e051dcae6bf
SHA1 5e504c04a702670ca821eaa24b227b9e5d12c20e
SHA256 e678681dde4ca60dd4e5806e5a26c99a88125375eb549a1cc1d3c18d634481d0
SHA512 c88049bf839a6482eb5fc0e77f9c9292ff7d80f3c09fb79c4f40229bb2c6c006b16346cf8c6f41631460034226dcc69b559dc2c5468620b017b732ccc2c5b515

/data/data/bright.view.land/app_ttmp/oat/t.jar.cur.prof

MD5 496eac8af00154612f4526831a659ec5
SHA1 7cc13bb098c60db3a480b34c78335cf7ecd7538a
SHA256 4c30892323b3d86c80d2dd53b0b07fcf58be88c922d6cb2b3125c8be7315b9df
SHA512 8ac4dd2f125c5c706906ba0eb71e1ff980c0dc599add5bed619870c7d96b615087ae2f17cf4d4e36c97d822bdd721bca5378a1ab3c0d1096b4a0ca7bc6e382b0

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-03 21:11

Reported

2024-11-03 21:14

Platform

android-x64-arm64-20240624-en

Max time kernel

149s

Max time network

134s

Command Line

bright.view.land

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/bright.view.land/app_ttmp/t.jar N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A
N/A /data/data/bright.view.land/100classes.dex N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

bright.view.land

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 api.wallpaper-sp.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 a.asense.in udp
US 208.100.26.245:80 a.asense.in tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp

Files

/data/data/bright.view.land/100classes.dex

MD5 abdef17ba4f14424b320d595b75dd5d0
SHA1 d9d857ff7d8d27b46ef15c36f1ddc446de6a65e5
SHA256 b1e8ba53201c08f510930bf2dd7bf9a1c5ce7c83220c31ab4249c37123551a55
SHA512 e048a6510d619bffb814cb1c6725b540fba2c9bb01e117c227e04b92d56c8f4711f82b6a63eb43796c4bea941ab2284f8eb7d48e394ed79e375dfe59188b7e25

/data/user/0/bright.view.land/app_ttmp/t.jar

MD5 e3447d5435bc33cb03183a57f3474f1e
SHA1 13b41650892f79bff94f3edf8689c3218ba962d0
SHA256 8eabaa1e5b64a753f5aeeee5e02ce584ab8e65c5edfc5e3bdf38f25462024dc9
SHA512 e4e7906b57056c413942ea3f5fa91cf3bc5f508a2e9c8273524c0cf84d7189f26b770f0130f57218ecba8982ac337f46a6d11d10dd8f8dc4f5f0c0fa02447ab6

/data/user/0/bright.view.land/app_ttmp/t.jar

MD5 4e1e6aa783bb8974b1436f0100156de6
SHA1 8d2d20dbf86960783c889dd9834e281bac850642
SHA256 58665fea32655b49869f9f7e6812f36906cd75dbe4af3f1d497e9bdeaf33fc53
SHA512 0a45ddb1269a3cd8a789ce3b9edef67e69c2968480938aac76e9e975c4cce049a42ebbcf0cf4058eef117e1041a1e7a8f15d504c5a9ca95b1b3d014ca91aadbf

/data/user/0/bright.view.land/databases/bright.view.landb-journal

MD5 2c71d18d364dd84618cac113565976bb
SHA1 131637da8954a23f50f7ba2ad5b650fca0fa4162
SHA256 e1efe540dab2e0101687fab9e39dbc0e4d2c801ac741772e62901cb1e7ed9dbd
SHA512 1270af66b57f1b95b5966375d73f070958ff00a9eaa469702948d25a139fb6bf6406df09254ba20b6b8017fa974413d5f02cdd2db159dec007135b4bacc2a1bd

/data/user/0/bright.view.land/databases/bright.view.landb

MD5 6fd0ea849fafce4729d7179807c79c66
SHA1 412eca6adc8788dc5c3eebbe3788d22f19c662d8
SHA256 8e5cbc858ce6e79db4ca4c65fa4bb02f4a5246ded5b9a955193ac6fbb09f6c74
SHA512 05f453db5cb11ee15a8aae6dac1fb23470894a69912ccb85bc3d30a7ecc1a7564cad21009badb1dee7cc3d930f5d024c0abc9aa7d04fe8ab47d3efaf895b1387

/data/user/0/bright.view.land/databases/bright.view.landb-journal

MD5 5f2ba6363dc3b912f9f6108bad5658bc
SHA1 a1ac80385e7f406c8dd03faadbe5f52d9f6cc100
SHA256 166d1beb44ea5b26ff33ec3e1651242b9da44ab4f33667cedd765a5a4c702289
SHA512 5753f6bbe6b6a7e2cd66b6506bd557d05f1f65025405f5b0da89e534a0e804bb324c8015ea7e3be503affe8fd43bf6443fd42474c20211077f790794f7d3ee89

/data/user/0/bright.view.land/databases/bright.view.landb-journal

MD5 659c4fe8fa93a154f4db97631efc2f04
SHA1 7e4afe43e362f76e5d612e8b1bc8e0967f4ac9c2
SHA256 6be8a7a5c3d099740135f3234166bca8152e5aef9e5223c871d252655ab0c5ca
SHA512 c012a458d60b726b46abb9ccb86a9ba0cbd1de6d7f95ac2cea713c27546e6f34706f08546c32f0fc3ce7899c82b3699d1245a8a47a76d507b53ed429bd464287

/data/user/0/bright.view.land/databases/bright.view.landb-journal

MD5 739995b15c03d4219951359d2a1512ff
SHA1 c550cd6e2955f8f32cf4ebcd3978c7752824675c
SHA256 bf10ebff8eb015a904f148abc6990276ac94e4906680c7df62fc485eeb16e922
SHA512 aaf3686efca49a7027604e9473f997845e1c4a874e97504636b30421fd685c2481f5895d9db92fa49448d405bc5c8024e05c32eeff5a5cdb9a1f25414c5c6bb0