Analysis
-
max time kernel
49s -
max time network
157s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
31-03-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
503ea2607ee4bfd730bf44791b424e85
-
SHA1
401cc3e67142b771338bfdfa3970b4447a81dd06
-
SHA256
10b1594b87010c09acb393d457417c240dc1962371e37988a1c804e93870541f
-
SHA512
718b75a5807c59a72e6149d365c5c7d28f04a2e5a7176ec2991a5555d9b32580c9de9dd77f13284bdbb5275dd8381867b0df24b5fc6b7d9001e70b578cd0d443
-
SSDEEP
49152:Dk4sAvFygukFZacB61rbXjVF6XLxLFFOLMmr6cTsH+aZhT5qOkRCP:Dk9CygBZn01vXzI5XOoXcsH+gQOQi
Malware Config
Extracted
cerberus
http://194.163.187.220
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.property.dress Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.property.dress -
pid Process 4188 com.property.dress -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.property.dress/app_DynamicOptDex/tLeHR.json 4188 com.property.dress /data/user/0/com.property.dress/app_DynamicOptDex/tLeHR.json 4188 com.property.dress -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.property.dress -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.property.dress
Processes
-
com.property.dress1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4188
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD50658162d6ba655c6000a07df639ad457
SHA10a6a9f5556c94140b3684fb77724982b3045a130
SHA256d666a46edd367a2f575f7162fb6cce8fff3eee79f07ff5343a3df2700f2417ec
SHA5126ad6dc1259b7f50b33e6fd45dbac51e2052ae776dd8ff00cd6ed976720d03c33b0eed0af5e886ffba9f7e38ba8896de6e80c1e100f5eda747c2f5c555a7b0a67
-
Filesize
124KB
MD56fa81badb67cfe97449ef0c657c80af1
SHA162105392d3a5d65cb46c7b331d9da486bdf6138f
SHA256a514cc6aa8aa51e8650bf8b63155b771aefc9617f54ececa8c5ddbbab4fdd62b
SHA5128c90965c1dcaf2b27ffa7add8607da9f04277bc954554881314fda0e95882fe12919e11b10a51b281c9da9e2c78484090c09be1fc89a6bb2296f8415984d6ddf
-
Filesize
124KB
MD542e52b32ca423bff942b18e59fcbd4ee
SHA1423593043888c539c2ce1d44b4f3149b9d921a3b
SHA2566031eb2b75985d492fc76b72b39c2b70cd224c2d65136ad689b21e13b8f2f3b3
SHA51253cbd08705dba9514199cfb45a89f71e957ad4b30dc3cf2162c82f7b1b509cfcdddd88ce5efc66928dffdbf16c46383d2882c26819e72fcaf2f9fcf343592388