Analysis
-
max time kernel
87s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
01-04-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
631170cab53cef6a3cc8a73d35a88ec6
-
SHA1
a32828458410e5bfef4e18627f72456dd70727f1
-
SHA256
e75bcc316514dacde0453a0766b46bc7075159ff9ae31e1d955c48fb745bf97f
-
SHA512
a1a607418b6beae31483aa99a3d118195a7a315b45317dca134089091c792f03dbc1105f2983227a4fe303d4fe6bceec897d6832fb7693cb5c505230e3df14c2
-
SSDEEP
49152:EdIk26OLx32qt5iB2sqyzOdyTdl6jIefQdjMb8kYNBfnzz77kNJR:EqKO932qXidSEpwEyqjO8PNBfPsJR
Malware Config
Extracted
cerberus
https://budabelegedude111.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.march.treat Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.march.treat -
pid Process 4409 com.march.treat -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.march.treat/app_DynamicOptDex/HNZup.json 4409 com.march.treat /data/user/0/com.march.treat/app_DynamicOptDex/HNZup.json 4409 com.march.treat /data/data/com.march.treat/app_DynamicOptDex/HNZup.json 4409 com.march.treat /data/data/com.march.treat/app_DynamicOptDex/HNZup.json 4409 com.march.treat -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.march.treat -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.march.treat
Processes
-
com.march.treat1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4409
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD53a8565cfc8f3422f28349fa81121e16c
SHA1726c1bf45a4abab028fe0bfa004417be99637419
SHA256739226a6f9b0276c328df038bee34315ebdd93182e3c8bcbecdaf0c7c8180076
SHA512690f92a44d8cb254515d2297e02ec5c560af1ebffec87b3bc81ba6864027d4790151d4a92e10569bd1cdd0e45f74304986aca73805abbc7382662b504257c25e
-
Filesize
124KB
MD528aa8501c9224ce2ac4dea04e18ea213
SHA1dd9e52b38e78dc3ca96e18b993738953523d5cec
SHA25672e96be4b69224503db786b7fb9b1db6b951ef827f0abda209c56159950c1891
SHA51221d3249469be391ae102972747ca57fa6161913135cebe7eea330cb370ecb0db6ac653ab4dccd9d8c387f3e077171dcd969683757b5412e8536ec6d58e9b9472
-
Filesize
163B
MD5f6e07a3e48f12c1e5bacc8c12810400a
SHA1a0a5e989da7693c8cbc982c28ec2b494ab3bde75
SHA256d3456d3063d3994731218f1db292b5a5e4da243dac1da35e3ff7886b353f7026
SHA512b88c32c0a9a35e59bcaa9e3ca6e8751b590662c24dce8e13e69078b6627d174b4ea718bbbbc21f48af6ff4bf76cfce9f8d04b6d00d5d2fd72a45b1425f43eb80