Analysis Overview
SHA256
4edf2dc78ef28d79f46c9eb8893a214ff8f67db3190441ee2048fe5212fa2894
Threat Level: Shows suspicious behavior
The file a5761f88fb6db0cb5ea8d11e55be2df1_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Queries information about the current nearby Wi-Fi networks
Queries the unique device ID (IMEI, MEID, IMSI)
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
Makes use of the framework's foreground persistence service
Queries information about active data network
Queries information about the current Wi-Fi connection
Reads information about phone network operator.
Requests dangerous framework permissions
Uses Crypto APIs (Might try to encrypt user data)
Checks CPU information
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-13 12:09
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 12:09
Reported
2024-06-13 12:12
Platform
android-x64-20240611.1-en
Max time kernel
178s
Max time network
147s
Command Line
Signatures
Queries information about the current nearby Wi-Fi networks
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getScanResults | N/A | N/A |
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
| Description | Indicator | Process | Target |
| N/A | alog.umeng.com | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Queries the unique device ID (IMEI, MEID, IMSI)
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Processes
com.xiaobaifile.wx
com.xiaobaifile.xbpush
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.204.72:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| GB | 172.217.169.42:443 | tcp | |
| US | 1.1.1.1:53 | hmma.baidu.com | udp |
| HK | 103.235.47.161:80 | hmma.baidu.com | tcp |
| GB | 172.217.16.238:443 | tcp | |
| GB | 142.250.179.238:443 | tcp | |
| US | 1.1.1.1:53 | api.kuaiyouxi.com | udp |
| CN | 101.251.106.193:80 | api.kuaiyouxi.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| GB | 142.250.187.194:443 | tcp | |
| GB | 172.217.16.228:443 | tcp | |
| GB | 172.217.16.228:443 | tcp |
Files
/storage/emulated/0/Android/data/com.xiaobaifile.wx/cache/uil-images/journal.tmp
| MD5 | 8679bf0516317016fa85177e3674fb88 |
| SHA1 | ef5deee9a613422b57d927e075b06c814647ed8d |
| SHA256 | cb49e8ba3753e55f320196d02e388ebe90429fa82626b87c9066455433b6d8da |
| SHA512 | 256d46d3dc648ab54d20234b2960e26eb380884d024b31ce9c10bff0a6310d596fc69f2a452531d8cba628a66c431d40888c3ab29bd297eb61c6f4bdb4109fff |
/data/data/com.xiaobaifile.wx/files/umeng_it.cache
| MD5 | 230b161a9e12201444451d0caea898ae |
| SHA1 | 5e2cdd20c994966ce65f08cc9cf7edf14b9fa69f |
| SHA256 | 59733c700225fe0e832258f8500f1723dfbd57481e52d2df8fe22a67ee385f9b |
| SHA512 | 2871d28c78b6775b62f09dec71705f9636985d7233c5d0d631ee7f24af63a5a25c3a5b7113fc8383093bb8dcc21958b67c784430d06f3ca5ef8672fd789faac1 |
/data/data/com.xiaobaifile.wx/files/.imprint
| MD5 | f54f35fc6949178c81b359ed56c8a05c |
| SHA1 | 28475cd1d6bd9e835aaf87c571538e7e158cb3c8 |
| SHA256 | f03715079fec8ef0b1c4729305b03ae526d903d8f2821bb8828d534152e4d29c |
| SHA512 | 7cd4f9e2c028c3b3810077af8bd4beb26c24303a1682d0f1bc622063e7b0dbd6d9e2aae603a27dcf879adf06e404c5c8b4a9fc9e2d7b39cd82b092223c91b350 |
/data/data/com.xiaobaifile.wx/files/umeng_it.cache
| MD5 | eabbe9c010295c6a7c6d091c9633bec0 |
| SHA1 | 4a34e68a841ca87b8732be333721ecf35fda0ba2 |
| SHA256 | c00ad3f34b59f9a404f5be547f43fb7b083c5533748fbdae9a8fa077aecfd549 |
| SHA512 | 72354876e2f5fe64f17d31a51bf88adc2085d39f34c9b6abd86b69b7d4413ed9cfa36e5162e34fbdd31c4779800a0b9eb07ed9a394be78cd8b179a36cb24a917 |
/data/data/com.xiaobaifile.wx/files/4e4688bf76__local_stat_cache.json
| MD5 | 2d805b13f2f28dc3ca9bbcc000f49bb5 |
| SHA1 | 9eac165b4d81258fd3967cde5cc53b53b1dabcb1 |
| SHA256 | c8a6624f390568f0ddcb9841336aec6a564460fdaf6624e562b32935b8956f19 |
| SHA512 | 5db8c57bab36bcf9db698c1dce70318cbffc156dd1d1c1e09e5b7ba60aff07b598ebbf26c4bd8a2b03bd6e59ef2dde2d944a22a8d8a19ecc8378e83afb7c83b0 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-13 12:09
Reported
2024-06-13 12:12
Platform
android-x64-arm64-20240611.1-en
Max time kernel
177s
Max time network
132s
Command Line
Signatures
Queries information about the current nearby Wi-Fi networks
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getScanResults | N/A | N/A |
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
| Description | Indicator | Process | Target |
| N/A | alog.umeng.com | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Processes
com.xiaobaifile.wx
com.xiaobaifile.xbpush
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | hmma.baidu.com | udp |
| HK | 103.235.47.161:80 | hmma.baidu.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.16.232:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | api.kuaiyouxi.com | udp |
| CN | 101.251.106.193:80 | api.kuaiyouxi.com | tcp |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| GB | 216.58.201.100:443 | tcp | |
| GB | 216.58.201.100:443 | tcp | |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/data/user/0/com.xiaobaifile.wx/cache/uil-images/journal.tmp
| MD5 | 8c92de9ce46d41a22f3b20f77404cc1d |
| SHA1 | 8671a6dca00edb72be47363a7071be65cf270373 |
| SHA256 | 68bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274 |
| SHA512 | 30f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56 |
/data/user/0/com.xiaobaifile.wx/files/umeng_it.cache
| MD5 | 0275ab35e4471ad922e110dc1facaed6 |
| SHA1 | e197fb190b8304eadc937a65dfc6d31110e40e3d |
| SHA256 | 4a6c930d1c1fe0cee97886544a96ac089b6fd92257964a12865ea2abc315e69c |
| SHA512 | 3e8c3bd812f32166b10662710d6ff8709f62947673666ec7e4b8722a5290aa0d178806438fe4001e148f3804124989a8aa8c15fb33d53bf441f17a71a63e90fa |
/data/user/0/com.xiaobaifile.wx/files/4e4688bf76__local_stat_cache.json
| MD5 | cf7dcae3d3e17533a9679f7146084ad1 |
| SHA1 | a11eb26391402368f134ee202629c6cd008f5f3c |
| SHA256 | 9ee9ecbaa1410d67656822201d575d7f829f626f1d49a6ac5a384fda58517525 |
| SHA512 | 9febee4db011b9e7935f74ac83f80c37d939f973ad49e83966d45e459467b69e4bb0754bc4e861b5f3ac5b34a428242acca91ffa48fcc998eec8708fe640b1f2 |
/data/user/0/com.xiaobaifile.wx/files/.um/um_cache_1718280647964.env
| MD5 | 78752cf75e06a61653bbb5b16847571c |
| SHA1 | b6b5560edcbd08d598dadfc322ad5b68cde6694a |
| SHA256 | 183417f5d2426e95010e3ba43c115445d5fdc18529f9bb3b2f590dc9b086b2b4 |
| SHA512 | a9d1a66e6a1d20d180fd540184d6fa13b5438a9b446edeec5e09b07f5f477c01ecc7731c37d4de632a9ef64cb489e1d7e828eaefc3a437076e6b1de776544ba7 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 12:09
Reported
2024-06-13 12:12
Platform
android-x86-arm-20240611.1-en
Max time kernel
177s
Max time network
131s
Command Line
Signatures
Queries information about the current nearby Wi-Fi networks
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getScanResults | N/A | N/A |
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
| Description | Indicator | Process | Target |
| N/A | alog.umeng.com | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries information about the current Wi-Fi connection
| Description | Indicator | Process | Target |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
| Framework service call | android.net.wifi.IWifiManager.getConnectionInfo | N/A | N/A |
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Processes
com.xiaobaifile.wx
com.xiaobaifile.xbpush
sh
ps
grep aria
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | alog.umeng.com | udp |
| CN | 223.109.148.141:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | hmma.baidu.com | udp |
| HK | 103.235.47.161:80 | hmma.baidu.com | tcp |
| CN | 223.109.148.176:80 | alog.umeng.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | api.kuaiyouxi.com | udp |
| CN | 101.251.106.193:80 | api.kuaiyouxi.com | tcp |
| CN | 223.109.148.179:80 | alog.umeng.com | tcp |
| GB | 172.217.169.10:443 | tcp | |
| CN | 223.109.148.130:80 | alog.umeng.com | tcp |
| CN | 223.109.148.177:80 | alog.umeng.com | tcp |
| CN | 223.109.148.178:80 | alog.umeng.com | tcp |
| US | 1.1.1.1:53 | alog.umeng.co | udp |
Files
/storage/emulated/0/Android/data/com.xiaobaifile.wx/cache/uil-images/journal.tmp
| MD5 | d9be2cb8bbe8b12cc2366cb05681dcbf |
| SHA1 | d5a12eb7cba3b51fb39097e7a2ff82336a36f309 |
| SHA256 | 494b45a22c5601157390d92dd834bf4175ad9a028b49a194f3d65619633feee4 |
| SHA512 | 91e58ab94a8e50d639595ffb9f71b5679918d40794273d10bec8b018dc8949baf15495878a35c317cb5e14e00cb6d3b5eaa64a061bc3ad0d4381d0f8b0ca9871 |
/data/data/com.xiaobaifile.wx/files/umeng_it.cache
| MD5 | c17971d43edc6d156e89872bd8e0fa58 |
| SHA1 | 2dd991c8ffc1c973953f89655771fc58bbaeb6f3 |
| SHA256 | fbead32732b3270d42ce3552c2cd587e8d57e075c84ab9b5741683e8be810dc9 |
| SHA512 | 72831d9209fc0cbba0aef0b8b9ee6bed2c0d9f2085fc5f487d515f085d24d0994153c7366fa97edc1053cc43d659ba21a1c15d784e7cd463fbd18afdf9055d83 |
/storage/emulated/0/baidu/.cuid
| MD5 | b39317857d1f74a39846f8ffdd6f6822 |
| SHA1 | a108d7d498e5af51b6b82671c0517fb659aece30 |
| SHA256 | 09528b3e0a9a75e6389d2d411a63740937fa0f5d77dbb21af3560b89fed24203 |
| SHA512 | 3179ef188f5bb70dc513ebc2ae1c3888e87e64086c06561b54ecd7441af9f85d752632521ff4599ce04e20b7ad4388c7dd1f621acca7c42a57009f83d305a6cc |
/data/data/com.xiaobaifile.wx/files/.um/um_cache_1718280645464.env
| MD5 | 061f493f3ca0d44cae5650e616feb6d5 |
| SHA1 | 8470fae97dc2b04670570c2f8808d11bd0c84b6c |
| SHA256 | 2cb0ec4adfa9fea85cb56ef35e6e206fc8e475c61a0b331be3bb5001b1709d43 |
| SHA512 | 45bb849d199835f49d429d9fe4189495759166f09153828f60fb0278760ab5258299d9746a36984ae405f35be51a6d874db85bcc2318e66c2f8c81bb8e7200e2 |