Malware Analysis Report

2024-07-28 14:41

Sample ID 240613-pbq2rasbrk
Target a5761f88fb6db0cb5ea8d11e55be2df1_JaffaCakes118
SHA256 4edf2dc78ef28d79f46c9eb8893a214ff8f67db3190441ee2048fe5212fa2894
Tags
discovery evasion impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

4edf2dc78ef28d79f46c9eb8893a214ff8f67db3190441ee2048fe5212fa2894

Threat Level: Shows suspicious behavior

The file a5761f88fb6db0cb5ea8d11e55be2df1_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion impact persistence

Queries information about the current nearby Wi-Fi networks

Queries the unique device ID (IMEI, MEID, IMSI)

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Makes use of the framework's foreground persistence service

Queries information about active data network

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 12:09

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 12:09

Reported

2024-06-13 12:12

Platform

android-x64-20240611.1-en

Max time kernel

178s

Max time network

147s

Command Line

com.xiaobaifile.wx

Signatures

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xiaobaifile.wx

com.xiaobaifile.xbpush

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 hmma.baidu.com udp
HK 103.235.47.161:80 hmma.baidu.com tcp
GB 172.217.16.238:443 tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 api.kuaiyouxi.com udp
CN 101.251.106.193:80 api.kuaiyouxi.com tcp
GB 142.250.187.206:443 tcp
GB 142.250.187.194:443 tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp

Files

/storage/emulated/0/Android/data/com.xiaobaifile.wx/cache/uil-images/journal.tmp

MD5 8679bf0516317016fa85177e3674fb88
SHA1 ef5deee9a613422b57d927e075b06c814647ed8d
SHA256 cb49e8ba3753e55f320196d02e388ebe90429fa82626b87c9066455433b6d8da
SHA512 256d46d3dc648ab54d20234b2960e26eb380884d024b31ce9c10bff0a6310d596fc69f2a452531d8cba628a66c431d40888c3ab29bd297eb61c6f4bdb4109fff

/data/data/com.xiaobaifile.wx/files/umeng_it.cache

MD5 230b161a9e12201444451d0caea898ae
SHA1 5e2cdd20c994966ce65f08cc9cf7edf14b9fa69f
SHA256 59733c700225fe0e832258f8500f1723dfbd57481e52d2df8fe22a67ee385f9b
SHA512 2871d28c78b6775b62f09dec71705f9636985d7233c5d0d631ee7f24af63a5a25c3a5b7113fc8383093bb8dcc21958b67c784430d06f3ca5ef8672fd789faac1

/data/data/com.xiaobaifile.wx/files/.imprint

MD5 f54f35fc6949178c81b359ed56c8a05c
SHA1 28475cd1d6bd9e835aaf87c571538e7e158cb3c8
SHA256 f03715079fec8ef0b1c4729305b03ae526d903d8f2821bb8828d534152e4d29c
SHA512 7cd4f9e2c028c3b3810077af8bd4beb26c24303a1682d0f1bc622063e7b0dbd6d9e2aae603a27dcf879adf06e404c5c8b4a9fc9e2d7b39cd82b092223c91b350

/data/data/com.xiaobaifile.wx/files/umeng_it.cache

MD5 eabbe9c010295c6a7c6d091c9633bec0
SHA1 4a34e68a841ca87b8732be333721ecf35fda0ba2
SHA256 c00ad3f34b59f9a404f5be547f43fb7b083c5533748fbdae9a8fa077aecfd549
SHA512 72354876e2f5fe64f17d31a51bf88adc2085d39f34c9b6abd86b69b7d4413ed9cfa36e5162e34fbdd31c4779800a0b9eb07ed9a394be78cd8b179a36cb24a917

/data/data/com.xiaobaifile.wx/files/4e4688bf76__local_stat_cache.json

MD5 2d805b13f2f28dc3ca9bbcc000f49bb5
SHA1 9eac165b4d81258fd3967cde5cc53b53b1dabcb1
SHA256 c8a6624f390568f0ddcb9841336aec6a564460fdaf6624e562b32935b8956f19
SHA512 5db8c57bab36bcf9db698c1dce70318cbffc156dd1d1c1e09e5b7ba60aff07b598ebbf26c4bd8a2b03bd6e59ef2dde2d944a22a8d8a19ecc8378e83afb7c83b0

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 12:09

Reported

2024-06-13 12:12

Platform

android-x64-arm64-20240611.1-en

Max time kernel

177s

Max time network

132s

Command Line

com.xiaobaifile.wx

Signatures

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xiaobaifile.wx

com.xiaobaifile.xbpush

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 hmma.baidu.com udp
HK 103.235.47.161:80 hmma.baidu.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 api.kuaiyouxi.com udp
CN 101.251.106.193:80 api.kuaiyouxi.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/user/0/com.xiaobaifile.wx/cache/uil-images/journal.tmp

MD5 8c92de9ce46d41a22f3b20f77404cc1d
SHA1 8671a6dca00edb72be47363a7071be65cf270373
SHA256 68bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274
SHA512 30f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56

/data/user/0/com.xiaobaifile.wx/files/umeng_it.cache

MD5 0275ab35e4471ad922e110dc1facaed6
SHA1 e197fb190b8304eadc937a65dfc6d31110e40e3d
SHA256 4a6c930d1c1fe0cee97886544a96ac089b6fd92257964a12865ea2abc315e69c
SHA512 3e8c3bd812f32166b10662710d6ff8709f62947673666ec7e4b8722a5290aa0d178806438fe4001e148f3804124989a8aa8c15fb33d53bf441f17a71a63e90fa

/data/user/0/com.xiaobaifile.wx/files/4e4688bf76__local_stat_cache.json

MD5 cf7dcae3d3e17533a9679f7146084ad1
SHA1 a11eb26391402368f134ee202629c6cd008f5f3c
SHA256 9ee9ecbaa1410d67656822201d575d7f829f626f1d49a6ac5a384fda58517525
SHA512 9febee4db011b9e7935f74ac83f80c37d939f973ad49e83966d45e459467b69e4bb0754bc4e861b5f3ac5b34a428242acca91ffa48fcc998eec8708fe640b1f2

/data/user/0/com.xiaobaifile.wx/files/.um/um_cache_1718280647964.env

MD5 78752cf75e06a61653bbb5b16847571c
SHA1 b6b5560edcbd08d598dadfc322ad5b68cde6694a
SHA256 183417f5d2426e95010e3ba43c115445d5fdc18529f9bb3b2f590dc9b086b2b4
SHA512 a9d1a66e6a1d20d180fd540184d6fa13b5438a9b446edeec5e09b07f5f477c01ecc7731c37d4de632a9ef64cb489e1d7e828eaefc3a437076e6b1de776544ba7

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 12:09

Reported

2024-06-13 12:12

Platform

android-x86-arm-20240611.1-en

Max time kernel

177s

Max time network

131s

Command Line

com.xiaobaifile.wx

Signatures

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.xiaobaifile.wx

com.xiaobaifile.xbpush

sh

ps

grep aria

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 hmma.baidu.com udp
HK 103.235.47.161:80 hmma.baidu.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 api.kuaiyouxi.com udp
CN 101.251.106.193:80 api.kuaiyouxi.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
GB 172.217.169.10:443 tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/storage/emulated/0/Android/data/com.xiaobaifile.wx/cache/uil-images/journal.tmp

MD5 d9be2cb8bbe8b12cc2366cb05681dcbf
SHA1 d5a12eb7cba3b51fb39097e7a2ff82336a36f309
SHA256 494b45a22c5601157390d92dd834bf4175ad9a028b49a194f3d65619633feee4
SHA512 91e58ab94a8e50d639595ffb9f71b5679918d40794273d10bec8b018dc8949baf15495878a35c317cb5e14e00cb6d3b5eaa64a061bc3ad0d4381d0f8b0ca9871

/data/data/com.xiaobaifile.wx/files/umeng_it.cache

MD5 c17971d43edc6d156e89872bd8e0fa58
SHA1 2dd991c8ffc1c973953f89655771fc58bbaeb6f3
SHA256 fbead32732b3270d42ce3552c2cd587e8d57e075c84ab9b5741683e8be810dc9
SHA512 72831d9209fc0cbba0aef0b8b9ee6bed2c0d9f2085fc5f487d515f085d24d0994153c7366fa97edc1053cc43d659ba21a1c15d784e7cd463fbd18afdf9055d83

/storage/emulated/0/baidu/.cuid

MD5 b39317857d1f74a39846f8ffdd6f6822
SHA1 a108d7d498e5af51b6b82671c0517fb659aece30
SHA256 09528b3e0a9a75e6389d2d411a63740937fa0f5d77dbb21af3560b89fed24203
SHA512 3179ef188f5bb70dc513ebc2ae1c3888e87e64086c06561b54ecd7441af9f85d752632521ff4599ce04e20b7ad4388c7dd1f621acca7c42a57009f83d305a6cc

/data/data/com.xiaobaifile.wx/files/.um/um_cache_1718280645464.env

MD5 061f493f3ca0d44cae5650e616feb6d5
SHA1 8470fae97dc2b04670570c2f8808d11bd0c84b6c
SHA256 2cb0ec4adfa9fea85cb56ef35e6e206fc8e475c61a0b331be3bb5001b1709d43
SHA512 45bb849d199835f49d429d9fe4189495759166f09153828f60fb0278760ab5258299d9746a36984ae405f35be51a6d874db85bcc2318e66c2f8c81bb8e7200e2