Analysis
-
max time kernel
44s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
31-03-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
503ea2607ee4bfd730bf44791b424e85
-
SHA1
401cc3e67142b771338bfdfa3970b4447a81dd06
-
SHA256
10b1594b87010c09acb393d457417c240dc1962371e37988a1c804e93870541f
-
SHA512
718b75a5807c59a72e6149d365c5c7d28f04a2e5a7176ec2991a5555d9b32580c9de9dd77f13284bdbb5275dd8381867b0df24b5fc6b7d9001e70b578cd0d443
-
SSDEEP
49152:Dk4sAvFygukFZacB61rbXjVF6XLxLFFOLMmr6cTsH+aZhT5qOkRCP:Dk9CygBZn01vXzI5XOoXcsH+gQOQi
Malware Config
Extracted
cerberus
http://194.163.187.220
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.property.dress Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.property.dress -
pid Process 5050 com.property.dress -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.property.dress/app_DynamicOptDex/tLeHR.json 5050 com.property.dress /data/user/0/com.property.dress/app_DynamicOptDex/tLeHR.json 5050 com.property.dress -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.property.dress
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD5864b0453edc1b04c9aae50f0d4ae13bc
SHA169eecc0cf33b6951be55531ed4925d8ee5c00c1a
SHA2560cc079728c8bef9462618e7bb48f722a8e16848c3695ddef7befb07190d7a72c
SHA512a272c580abd4a0f79a4099ecf6885d398eaa362a0f70499688229583d8ebb350ddfb24a835d485f20cabbb1d7ee67a064346eb28d5da08df2f5fcf323e9a79a8
-
Filesize
124KB
MD56fa81badb67cfe97449ef0c657c80af1
SHA162105392d3a5d65cb46c7b331d9da486bdf6138f
SHA256a514cc6aa8aa51e8650bf8b63155b771aefc9617f54ececa8c5ddbbab4fdd62b
SHA5128c90965c1dcaf2b27ffa7add8607da9f04277bc954554881314fda0e95882fe12919e11b10a51b281c9da9e2c78484090c09be1fc89a6bb2296f8415984d6ddf
-
Filesize
124KB
MD542e52b32ca423bff942b18e59fcbd4ee
SHA1423593043888c539c2ce1d44b4f3149b9d921a3b
SHA2566031eb2b75985d492fc76b72b39c2b70cd224c2d65136ad689b21e13b8f2f3b3
SHA51253cbd08705dba9514199cfb45a89f71e957ad4b30dc3cf2162c82f7b1b509cfcdddd88ce5efc66928dffdbf16c46383d2882c26819e72fcaf2f9fcf343592388