Analysis
-
max time kernel
60s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
01-04-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
6ff8f6df48139ad4cd77695f2bcdbf3e_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
6ff8f6df48139ad4cd77695f2bcdbf3e_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
6ff8f6df48139ad4cd77695f2bcdbf3e_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
6ff8f6df48139ad4cd77695f2bcdbf3e_JaffaCakes118.apk
-
Size
2.8MB
-
MD5
6ff8f6df48139ad4cd77695f2bcdbf3e
-
SHA1
bb71c54b85da50502b2a6ee48644daa074168547
-
SHA256
39d33af83cb1d553697b5b04cbde87b97b30f344a7cbeaf5b3fd0b162e170ec3
-
SHA512
2b4828051b35294118e1822ffd2b543422fb6c8c6f177722ee80083ecb2683a98a50c4f0d44e48f11ee9a3f9f0b946b3c396783ee9973dcde59e0c09eb9d2c71
-
SSDEEP
49152:Y3iglVMWbJCc9KQqBUfjcUGaiIj7nDYGQ12/wMwbiDnyRBA1wm62FnlNdBpBY9oj:YyyGWdCwRqUAUGEDWhMPnSA1wmTnZBJj
Malware Config
Extracted
cerberus
http://tornacimamutxyz.site
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.alter.tool Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.alter.tool -
pid Process 5117 com.alter.tool -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alter.tool/app_DynamicOptDex/SypIWOG.json 5117 com.alter.tool /data/user/0/com.alter.tool/app_DynamicOptDex/SypIWOG.json 5117 com.alter.tool -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.alter.tool
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD50e9b258b53b293bc71b1a04717149e5d
SHA10abdd3f2b2eb22315a72daed09336db4835142b2
SHA256f7d8073a9139525137b9a48ac076bf4a91901a0ffbd79ba271976a23ca48e351
SHA512ba3d34b18bdb15537a5a1891caac2871423f5f7adfaf1e86aca6bad70232ee4e82a31498c286f88da2213ce52b95e17cf43e53471b1df6d42d50e17b6a788920
-
Filesize
124KB
MD5702c7269f0754a2da293b5880f10116b
SHA1e3796746c27a55a59a00f9c2d03f37b03678091c
SHA2560b95d39b1f8d329a54e4362b95fb6b18bc19a54d8497b47e3c27abf1120e0491
SHA5120ccafaf44a48159f536abc283a01852a640d45302edeb454494ba2477f5c3e09c95ea3f072487a18687ba72b8482628900bc210d8ca1250f6e0a216be2115627
-
Filesize
181B
MD53cc193fb6b7f8521312817fbbc27112e
SHA1b5f1d032ce3468079aa1b4b91d27868a7dcefac5
SHA256062675f154d61391978c43326f3cbe375140d923c2cd7480223dbe545cb8b4f6
SHA5125a4e2ce260c4b61fd21bc14aaf19f9c0f930f010e79d6a4cd1609c6441c67ead105359991af2135318de225508fd5843c0bba748f99cec4581a2f1ef5b5ddd74