Analysis
-
max time kernel
147s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
02-04-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
7f0b39cc6ad10d800d7d5b18f8bd0a99_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
7f0b39cc6ad10d800d7d5b18f8bd0a99_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
7f0b39cc6ad10d800d7d5b18f8bd0a99_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
7f0b39cc6ad10d800d7d5b18f8bd0a99_JaffaCakes118.apk
-
Size
2.8MB
-
MD5
7f0b39cc6ad10d800d7d5b18f8bd0a99
-
SHA1
5c4d16375adb8e0fe6b5acbadc59e94b4e31352c
-
SHA256
e9fc94b9571c7fac6446a5dcef86c8eb7d5318ef4d5783ab387ac805f6c27b4f
-
SHA512
1c44159e73ef94ee58f32bc1f3164dd048594a224d7c7ea86cf4bc6aa1fb68f84e4035d57eb39c963663ea9cc38f1c6bfa7c05683bd31ff63393a9a88f8e7ae3
-
SSDEEP
49152:DpV0bxZC0NqMqpEi388PflfkBeHE3/gK0s+sceJjJJCxRQRI6VM+5B:F+b7CY5qts8iBQjKescOJCxRq8y
Malware Config
Extracted
cerberus
http://tornacimamutxyz.site
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.angry.seek Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.angry.seek -
pid Process 5032 com.angry.seek -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.angry.seek/app_DynamicOptDex/lTUETkY.json 5032 com.angry.seek /data/user/0/com.angry.seek/app_DynamicOptDex/lTUETkY.json 5032 com.angry.seek -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.angry.seek
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5dece0b9285a7f4adb9cc223694094cc4
SHA1c4ce8be5cede385d8faaf792709bbef710b74ee9
SHA256295fd8a61f3123b87585f2c97bde12e86fb51944dac84483efbafd7a6dc6bc61
SHA5129606399a9025570bfcd0030c49d3ffa1dcfeb1855d340629c767f1c16cec1815ca61ca2bb8ff15f31c2ba53288c920f3185c274aa020c6e28ce394c623a2199d
-
Filesize
124KB
MD5faf6fcc1b97ddc80a96cc11452bd7ecd
SHA14cb2150f0cd2119f24f627b90c69154eef1c4c9e
SHA2564a5db1a3884f8b545f3e5a24a15f49926d7f33a19b75416f512f31b395ec5aaf
SHA5124f371308f21b16398757495de18464fa19193343f60d1b75d743ab216d30a6a5c7961b39cded2465c5cdcf51c5ee4ea9719e865514e3de3a4cdbd1fcdaf8c75c
-
Filesize
199B
MD55275a16b385935b8a1b917e24100e654
SHA16df5a89383ab8081eca6c4276dfd6ee16ec45ff7
SHA256aab3711167578bef3fc9bf11fdea8dd5f3bbccb1eb3a5378e1518ccfecbd6713
SHA5126cc763573135067f9b71d577ac1f9a4ba6b47a93bd633137af9814cc5b42bd19e5faef411a38f34a53e1e0ffad9237099d42f5c67548103b20daa631ff1ca065