Analysis
-
max time kernel
71s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
01-04-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
631170cab53cef6a3cc8a73d35a88ec6
-
SHA1
a32828458410e5bfef4e18627f72456dd70727f1
-
SHA256
e75bcc316514dacde0453a0766b46bc7075159ff9ae31e1d955c48fb745bf97f
-
SHA512
a1a607418b6beae31483aa99a3d118195a7a315b45317dca134089091c792f03dbc1105f2983227a4fe303d4fe6bceec897d6832fb7693cb5c505230e3df14c2
-
SSDEEP
49152:EdIk26OLx32qt5iB2sqyzOdyTdl6jIefQdjMb8kYNBfnzz77kNJR:EqKO932qXidSEpwEyqjO8PNBfPsJR
Malware Config
Extracted
cerberus
https://budabelegedude111.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.march.treat Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.march.treat -
pid Process 5090 com.march.treat -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.march.treat/app_DynamicOptDex/HNZup.json 5090 com.march.treat /data/user/0/com.march.treat/app_DynamicOptDex/HNZup.json 5090 com.march.treat -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.march.treat
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD53a8565cfc8f3422f28349fa81121e16c
SHA1726c1bf45a4abab028fe0bfa004417be99637419
SHA256739226a6f9b0276c328df038bee34315ebdd93182e3c8bcbecdaf0c7c8180076
SHA512690f92a44d8cb254515d2297e02ec5c560af1ebffec87b3bc81ba6864027d4790151d4a92e10569bd1cdd0e45f74304986aca73805abbc7382662b504257c25e
-
Filesize
124KB
MD528aa8501c9224ce2ac4dea04e18ea213
SHA1dd9e52b38e78dc3ca96e18b993738953523d5cec
SHA25672e96be4b69224503db786b7fb9b1db6b951ef827f0abda209c56159950c1891
SHA51221d3249469be391ae102972747ca57fa6161913135cebe7eea330cb370ecb0db6ac653ab4dccd9d8c387f3e077171dcd969683757b5412e8536ec6d58e9b9472
-
Filesize
806B
MD57d98a5862119492c6f98b66415c43a1e
SHA1c517b17e42cae9c7468280851edeccc6ed05808d
SHA2567f3ef4829d2ca95f746910e8df212dc6ea36cf379b101470831894b2955e2113
SHA5126c143b77b43854d40ce45a89de3deb732765cc775b25e38c0713c7680159ca535ea8ce08c0a50ca731c5016aa4f7eaf49bd92a772cb16f51cd3910a93d65753a