Analysis
-
max time kernel
141s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
01-04-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
-
Size
2.8MB
-
MD5
75a837f084a1e986dcb432ef2ed3a125
-
SHA1
9a92a835327840f32161067e0c6debd704df7c52
-
SHA256
9a6b68c82fe8faab69e63ae0309948a92f9c954564d6e0132ef3696f11662521
-
SHA512
e6319b95fd86307763475f68a81c09d27b3f6228f931dc4c462cb1eeade4b8d240ef8357fe1400fa3a4e1836741048d86fe6408dd04a3f3ecfe932527e58d261
-
SSDEEP
49152:OeaVQqOUYP7DqCDIYJO0rMZbm2SrViPfn3GudANNXC2Demh:FmQ7UIvqp2OPb5miPPGudANvh
Malware Config
Extracted
cerberus
http://194.163.139.138
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tourist.garage Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tourist.garage -
pid Process 4262 com.tourist.garage -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tourist.garage/app_DynamicOptDex/QJjUO.json 4262 com.tourist.garage /data/user/0/com.tourist.garage/app_DynamicOptDex/QJjUO.json 4287 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tourist.garage/app_DynamicOptDex/QJjUO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tourist.garage/app_DynamicOptDex/oat/x86/QJjUO.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tourist.garage/app_DynamicOptDex/QJjUO.json 4262 com.tourist.garage -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tourist.garage -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.tourist.garage
Processes
-
com.tourist.garage1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4262 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tourist.garage/app_DynamicOptDex/QJjUO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tourist.garage/app_DynamicOptDex/oat/x86/QJjUO.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4287
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD58e59633ce7709798222da74e8088f654
SHA13a138f5cb680c70054da250c0f1cb52d7d7fa787
SHA256f2ae56adaa9b70f703bb68d2e4432b892033c9d84537995f335f2b2ebbba2c1f
SHA5122c5f90f43947a7d8f075074fb892bbb6fd62f8391a673954b0d2f1dfc0a8d1f298de0c266acb79cabee583c242a9564e30285baea64f52f3cd145a143f0a320c
-
Filesize
124KB
MD522527cd57cb42be6e6eddf04d58661e4
SHA12878512f9aeb4e00e7ee55edabfa7c9a803b074b
SHA256c15034bd74befc7bbb52932590e0ef386bdb1500f4b7206d2a4c01d0daf9f985
SHA5122357c9057f1fe2ccdf9082bf9bfff41d7686a4739b9d04a7de0913d1e817ceaa8cc2fa45a83c9b2747228843986ee4bf9b16fd57bf6dc4563b0f10201132dc8f
-
Filesize
801B
MD50f762d77d2409148ae44593a83060484
SHA1ad8dc7e65e9ac343783ac6a37649f5c04dcd1855
SHA256d801237bd35c5a68b3cc80ff80cb35f07a71da7be439f2045d51d750551980bf
SHA51263bf7a37f632b4e982c3124a5c1120f4cef180ddbfeb92dc7e54b3656f420fe3c70553adbf45943afdd60bcacc39fda70abec6d8932f6629f97057967c519476
-
Filesize
124KB
MD5ff59633810c29759d4fbe812cf6953a4
SHA14643373fe9652d4667707bab0d8cb37443a8e71e
SHA25600b7b713b962f3622606d3d6e704c3a30068dfa25cd3504e7c6a0b50067c15b9
SHA512f9a9ae89d04de124969494ec5d1ed3d6092b3138e42a4272399c82521b7a0157620d0c63cdf7e025958035896928979392b72984dd46e04c438dec215d4969a7