Analysis
-
max time kernel
84s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
01-04-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
66ff573205df6847e473db816628bf8a_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
66ff573205df6847e473db816628bf8a_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
66ff573205df6847e473db816628bf8a_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
66ff573205df6847e473db816628bf8a_JaffaCakes118.apk
-
Size
2.8MB
-
MD5
66ff573205df6847e473db816628bf8a
-
SHA1
28e6eb9fc01ae3b4a640c3a9aeef0b9d95de9666
-
SHA256
45e63dd8588695731b33aa0b84f386f89fc4022166a42900e0467dabd4867d17
-
SHA512
3d8f599a894775784f44d00719b7793ac2b3cfaf8d0ab10ae8f619987bf026c9dfce867f8927a979fe47e6a1ed39e623372cac6d05950942e9fb7b1ffbb0954c
-
SSDEEP
49152:U3m/urrVOMqRfx3uOidtyMwf2OgEW+omEBOjTxP0MYuJsysPlZteGTV83dN:Smir5qr+OetO+zKtP0/uGyqPzV83n
Malware Config
Extracted
cerberus
http://144.91.116.117
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.regular.border Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.regular.border -
pid Process 4231 com.regular.border -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.regular.border/app_DynamicOptDex/MonTqA.json 4231 com.regular.border /data/user/0/com.regular.border/app_DynamicOptDex/MonTqA.json 4256 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.regular.border/app_DynamicOptDex/MonTqA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.regular.border/app_DynamicOptDex/oat/x86/MonTqA.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.regular.border/app_DynamicOptDex/MonTqA.json 4231 com.regular.border -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.regular.border -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.regular.border
Processes
-
com.regular.border1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4231 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.regular.border/app_DynamicOptDex/MonTqA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.regular.border/app_DynamicOptDex/oat/x86/MonTqA.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4256
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5c212366c194a61a6a4015bc1c020b3a4
SHA101f1f46dfe2be5d2e2dc7d623cbe059018bda145
SHA256ec9e915d2e16d92e92a9ad32dc2b9e2179dae0bd832a1b438982deb9556367d4
SHA512e5a63bb7a1a4ab2ec8233612f14cd27329a97e5f40d53c629605ab589ca9d18e93c0db266377b95c40f38cd2ec6cfb0bcb42bb55b2e10e88d4718961aa828f89
-
Filesize
124KB
MD58d60dce1edca6786040afe676b55db5d
SHA1de1d09234c0138d97f1fd2c233e3ffd0a7fc5d19
SHA256e43f67209b6ffb23a42da427f47434003b2074bfbec5bf06b8c6189de04de9de
SHA51288fd0a0ea6424f83086d9f11759ca6298d1209a86ed7a184adaa0783332e595d3d1c996e5af4b89926872dd39ffd30953691ec7c41a9d813a5fc39c9bf33f96e
-
Filesize
818B
MD544ade340192eff09c7f0da676adb3ba5
SHA1de713ddb2ab61722d22b40bcdfc987b974967d5a
SHA2568e64705b3fdbfcaa19910e71025dae4cebc002c7d14e418face3faa31d624acc
SHA512cd8873a1c29e9f19d01d372bfe5e4945b371f3cf99674858caa135f0f1afb0355fae28876d47a6d3e959133369b32c875f4f458cf2652f38759979570fa6f0b5
-
Filesize
124KB
MD53e2adfd7407e4ceea2affe3da4d33fd2
SHA1af9f8b9bb406e623d76fe25fc1f65b32a3b8ef6a
SHA256d8b52343bdb91460c47a03a96610fb589d92fb940a1df8163127b3cd5cd68faf
SHA5129e01da7565c1458c8c96cc253657ef4b2773c6fe2ad78f9a9316747c859707ceb6494c154c023f98abca755e7f3caf982746bed64e71993f24e8859fc14a3d31