Analysis
-
max time kernel
72s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
30-03-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
45f493e525bbe41865d76d3f60d22bde_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
45f493e525bbe41865d76d3f60d22bde_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
45f493e525bbe41865d76d3f60d22bde_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
45f493e525bbe41865d76d3f60d22bde_JaffaCakes118.apk
-
Size
2.5MB
-
MD5
45f493e525bbe41865d76d3f60d22bde
-
SHA1
32a1fb26ef90f64411cc25d30a868933c8c56597
-
SHA256
6208a4c0def1a46852a98bdd37621568ef64be7498d50a7f132faa422ec4c68b
-
SHA512
f6bf56e1a8a2017d745f07f8b6697d470dba8b64a81fae62000ec9fe474bea117a45db4b2b2dc0b3245b1b035ddc878360326deb16392b9dfd4009ed33005712
-
SSDEEP
49152:NhpWv0OvsuOV8H6SfYjoj0v9riRKbNRjQjXL8GarkiZb:NhAPi8HlQjPi6RIL8GUkiZb
Malware Config
Extracted
cerberus
http://51.132.252.42/
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.enlist.scatter Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.enlist.scatter -
pid Process 4606 com.enlist.scatter -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.enlist.scatter/app_DynamicOptDex/xaJetlG.json 4606 com.enlist.scatter /data/user/0/com.enlist.scatter/app_DynamicOptDex/xaJetlG.json 4606 com.enlist.scatter /data/user/0/com.enlist.scatter/app_DynamicOptDex/xaJetlG.json 4606 com.enlist.scatter /data/user/0/com.enlist.scatter/app_DynamicOptDex/xaJetlG.json 4606 com.enlist.scatter -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.enlist.scatter -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.enlist.scatter
Processes
-
com.enlist.scatter1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4606
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177B
MD55e3d494e228ef1c295f4900af01b5d44
SHA1874f9cba781a5e89766287ba8de5bedf11f19fd1
SHA256e09c263b2235fd9662584686c38d2a1214df2e2483497ce22658fbbbc6847b99
SHA5127aadd2c51e221aa0cf3d937ca59834228dfb63adf6de0de2739fe0838467f29fdc9e8df824477f7cb00eea4ba5afbdeb0c6b96e1b8c78e96a2c4eeb1a19413e1
-
Filesize
119KB
MD5df12f4f43e7d8b306fc74323b93ce1c9
SHA14ff0e550885d803f03585ab2c4fe708882f8652a
SHA2560ffc884de89ed7fb976d19b452375b9af90a9a4565db3f18c7d0c079c59c879d
SHA5127da67ca56bad0f1daaa526d8dbdae40c0a24524d3718a9c4cdae3d73acb480fa7d9e4bc17ff4239060436819e280f70a24771a017a8c6282d0a08664c227fa91
-
Filesize
119KB
MD5c0bd3ca742af2bd903c0a7a032323e89
SHA1892f8dfef740d2c50a42c1e1aaf683a83087b7ec
SHA25632e7e25d2484d0dfd9f1b211c0617d170d630d33a3a7343de4623e2002d60cde
SHA512c07c2f534a1c1923d051b4c0f376b24135ccc597df0a368daeb2d347cfeb870acdd051ceb93cba2556844f1b3f758a4a46c908a469d01cac55d81806fd104988