Malware Analysis Report

2025-01-19 08:03

Sample ID 240610-v7vygavdjp
Target 9b7cb98b2c9941a4a1f931aa5620f828_JaffaCakes118
SHA256 996f4efc158ad2fc507f8baf3b72fe7b5f39d097df35bfca2951068164937815
Tags
discovery impact
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

996f4efc158ad2fc507f8baf3b72fe7b5f39d097df35bfca2951068164937815

Threat Level: Shows suspicious behavior

The file 9b7cb98b2c9941a4a1f931aa5620f828_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery impact

Requests dangerous framework permissions

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about active data network

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-10 17:38

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 17:38

Reported

2024-06-10 17:41

Platform

android-x86-arm-20240603-en

Max time kernel

35s

Max time network

152s

Command Line

cn.robotpen.app

Signatures

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A f.appjiagu.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

cn.robotpen.app

chmod 755 /data/user/0/cn.robotpen.app/.jiagu/libjiagu.so

chmod 755 /data/user/0/cn.robotpen.app/.jiagu/libjiagu.so

/system/bin/dex2oat --instruction-set=x86 --dex-file=/data/data/cn.robotpen.app/.jiagu/classes.dex --dex-file=/data/data/cn.robotpen.app/.jiagu/classes.dex!classes2.dex --dex-file=/data/data/cn.robotpen.app/.jiagu/classes.dex!classes3.dex --oat-file=/data/data/cn.robotpen.app/.jiagu/oat/x86/classes.odex --inline-max-code-units=0 --compiler-filter=speed

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 f.appjiagu.com udp
CN 180.163.249.208:80 f.appjiagu.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
CN 180.163.249.208:80 f.appjiagu.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
CN 180.163.249.208:80 f.appjiagu.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
GB 216.58.201.110:443 tcp
GB 142.250.187.194:443 tcp

Files

/data/data/cn.robotpen.app/.jiagu/libjiagu.so

MD5 1383b616dee6678b3591e577ace67225
SHA1 f2b0f5968b52f9c3ed022f3b3ba67e6142df89ba
SHA256 945e12ea3019404a01754579a234b21ff3c7c17c175750e514c0d404e9f30554
SHA512 72dda5b9833701c52e44260d979f6b91dface07899aa20ea686ef3d09f3225826140b7e8c336072aca21d51e88151a3fdb6952fc53b9749051f16197e8086b60

/data/data/cn.robotpen.app/.jiagu/classes.dex

MD5 60c37016da65bf3a1e44cba4fd703d6c
SHA1 dd1b3f26f59ee083d2fb666463c7f6508c391e89
SHA256 5d57f7af5cd9316097dec22add389d04e5706c71803b23b39f8e73e2fd5a36cf
SHA512 f61499d14755e01ca48423c1872ca8866d086f92d67886b7ad71be1d9cd91c299fd0347de1187224db99ca1071183958b4453f01378dd4f0abbb9394a6b72182

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-10 17:38

Reported

2024-06-10 17:41

Platform

android-x64-20240603-en

Max time kernel

34s

Max time network

166s

Command Line

cn.robotpen.app

Signatures

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A f.appjiagu.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

cn.robotpen.app

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.206:443 android.apis.google.com tcp
US 1.1.1.1:53 f.appjiagu.com udp
CN 180.163.249.208:80 f.appjiagu.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
CN 180.163.249.208:80 f.appjiagu.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
GB 172.217.169.14:443 tcp
GB 142.250.200.34:443 tcp
CN 180.163.249.208:80 f.appjiagu.com tcp
CN 106.63.25.33:80 f.appjiagu.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.213.10:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
GB 172.217.169.46:443 tcp

Files

/data/data/cn.robotpen.app/.jiagu/libjiagu_64.so

MD5 fe499af830d13d61e81eb64ad109a06e
SHA1 49898e14b29efc938099c7a4acc05064a09d5831
SHA256 b0a8f05575799435edaa9aa48319c459062259cc127748fc123536ad79f11470
SHA512 8f4edfb2b22d326e55fb6186ce66640300f150e236e5c5bc69206bb21c8b4bbf9e4b759f2210ade37fea15c6772bfacb8510d03b6cbe1e6c966298c7d7a7055a

/data/data/cn.robotpen.app/.jiagu/libjiagu.so

MD5 1383b616dee6678b3591e577ace67225
SHA1 f2b0f5968b52f9c3ed022f3b3ba67e6142df89ba
SHA256 945e12ea3019404a01754579a234b21ff3c7c17c175750e514c0d404e9f30554
SHA512 72dda5b9833701c52e44260d979f6b91dface07899aa20ea686ef3d09f3225826140b7e8c336072aca21d51e88151a3fdb6952fc53b9749051f16197e8086b60

/data/data/cn.robotpen.app/.jiagu/classes.dex

MD5 60c37016da65bf3a1e44cba4fd703d6c
SHA1 dd1b3f26f59ee083d2fb666463c7f6508c391e89
SHA256 5d57f7af5cd9316097dec22add389d04e5706c71803b23b39f8e73e2fd5a36cf
SHA512 f61499d14755e01ca48423c1872ca8866d086f92d67886b7ad71be1d9cd91c299fd0347de1187224db99ca1071183958b4453f01378dd4f0abbb9394a6b72182