Analysis
-
max time kernel
57s -
max time network
144s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
01-04-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
77b5788f04030d138879e3080e712078_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
77b5788f04030d138879e3080e712078_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
77b5788f04030d138879e3080e712078_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
77b5788f04030d138879e3080e712078_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
77b5788f04030d138879e3080e712078
-
SHA1
880e365f17271d4492f8cca8f86c40835e87fc15
-
SHA256
b08ead4e5ecc18f14e6a92ad09e9ec7dfdfda91d673c0829769f35c76eea2f1b
-
SHA512
ea19c21eddbcbe7bdd3d9fbf0728dc83c0f34a6e30d7227d4d916d0f023007370c38c79bfacb73b6a0102a799a06751364b3c1663818883e2aecd9dcd2c8ec7b
-
SSDEEP
49152:41WqANC++Lf3uXr6xbvCw6iyFj8irzc/tfxqIhQQHOjhDs1:4gdNZ+LM6NvCw6t82c/Pq+YDs1
Malware Config
Extracted
cerberus
http://20.90.106.208/
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.polar.mad Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.polar.mad Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.polar.mad -
pid Process 4581 com.polar.mad -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.polar.mad/app_DynamicOptDex/lECnmhp.json 4581 com.polar.mad /data/user/0/com.polar.mad/app_DynamicOptDex/lECnmhp.json 4581 com.polar.mad /data/data/com.polar.mad/app_DynamicOptDex/lECnmhp.json 4581 com.polar.mad /data/data/com.polar.mad/app_DynamicOptDex/lECnmhp.json 4581 com.polar.mad -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.polar.mad -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.polar.mad
Processes
-
com.polar.mad1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4581
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD510d25aa7eea1091ed36ac3fc44232c80
SHA1ee37b32360f960fd8fc78a737232295e60194296
SHA25604b25eda9c6ff386415a8a09be467d15eaf172d6666aaefab10f306d632b9e3d
SHA51298a815f250248ec28a3bec2b82f552ac647ef24eb5aa522bdf3bc02c8c79af41ba7700adf18b59b23f562e2b1b9b4d4e88ced9d4f8cf0694142911e4808f4e60
-
Filesize
122KB
MD51141f85dce75977878b0915a1a1498d8
SHA16ba93e924febe5d85468737c4d528bc9fcc56839
SHA256b356f9950d1305103221d46862e93344075f9e463e02e1be570f616bd60fc6bc
SHA512beea6e7ee932e324cf2985c5ae4bb78d285fcd843ba7453064931dc546ed2ba631e96253de5438c2d6ed4b6e909f6d6bda562065c895eef93b20cab1fac4a263
-
Filesize
169B
MD5c8a4061ec7b6d286071374f4e2736b59
SHA1598c21b2bc2fa4e17d4632c82815dd65737637d7
SHA256dda54b22e485fe664105347382f5063e1bb8235ed28d952f34ff262997140fe2
SHA512b42d8eaab3bbcaa584d9da5ffacbff287114ce7efe521ccb69387fbfb6bb6efb44a3e6c0ffa254344c0f0c6d558475ce75b606d7827e361ba4283457532b1307