Analysis
-
max time kernel
68s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
02-04-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
8fd36fd78059b612caf4306f86f8f5da_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
8fd36fd78059b612caf4306f86f8f5da_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
8fd36fd78059b612caf4306f86f8f5da_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
8fd36fd78059b612caf4306f86f8f5da_JaffaCakes118.apk
-
Size
3.0MB
-
MD5
8fd36fd78059b612caf4306f86f8f5da
-
SHA1
eff37afe2ee8864c5cdee7e07b3184a07627fcc0
-
SHA256
bf741ef4c2558d5b8485c6de61c64e578a8198d1d050a1e1566b5e10bee207ec
-
SHA512
ed3ab1276e8bc7cf69eb54176c491d3c63ee23d9f0d55940f322551e79941205ff194fc3d29845b1be2ca06518b0aecac6ff1735ed293964a986572a5f63f00c
-
SSDEEP
49152:8OQRxguYJzjIt06xq/9OxeSyA6G3BOixe+zthSRfZiNUkyxlL:pHxjIfxq8cSypG3bMCex0UzrL
Malware Config
Extracted
cerberus
http://185.182.8.36
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.quote.couple Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.quote.couple -
pid Process 4209 com.quote.couple -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.quote.couple/app_DynamicOptDex/CsIa.json 4209 com.quote.couple /data/user/0/com.quote.couple/app_DynamicOptDex/CsIa.json 4269 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.quote.couple/app_DynamicOptDex/CsIa.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.quote.couple/app_DynamicOptDex/oat/x86/CsIa.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.quote.couple/app_DynamicOptDex/CsIa.json 4209 com.quote.couple -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.quote.couple -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.quote.couple
Processes
-
com.quote.couple1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4209 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.quote.couple/app_DynamicOptDex/CsIa.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.quote.couple/app_DynamicOptDex/oat/x86/CsIa.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4269
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD53de2232080ac6a4811995b7c1bf825e4
SHA1ef2ee8bd6c8c7b9903ff93807ca83d2b9ef5e475
SHA2566d046f6aa352743571a732a3edad4a38b735a669496448224b28203e4dcd6f19
SHA512506093e6719522b94bf6cb9812d7ae465847536c5bb35f579932628f8501377579dceceecf29da02d501fecf7c83986d68e2884a92e4a39fb6d95295354cf606
-
Filesize
124KB
MD5cf7cfec4ae47494ee1a2b04e5f3a7905
SHA1a80188bfc50dda4d628f4bd98f3549b8e1712b7c
SHA256fec13c43a4c96f9df124f937a9f79b07e237812d768a813b7c6179cd95a40688
SHA512e763081559bf7b1b8570f46407ecf8254de1464219b173021ab3bd3c23d3c1ebcf4eab4268c8b43ad480b91183c219125069fed4c3723cbd6c39817dc5d792ff
-
Filesize
814B
MD5a4caa7f322ce809b0c0ab125aacca646
SHA1e6149551e935860c93bb57ccb1ee882d3ba07c0e
SHA25646f30b4497478cc7295574f2353a19b1f03ad5952e39bc754d9eebc489f2b287
SHA512fa73b60e8a49ee791e64546dea1f6cc29ace6d5cdd2d5ab90a906e5327c1e8cd1cce527580a2ea44d2f0d3924d9d040d023ac99c4171103a098f1e1a270620e3
-
Filesize
124KB
MD5624737ce6415a6da2691c82cb318f962
SHA1ef37a4932127c7c7a776111abaafe806fd1f2140
SHA25674c6db9ce64870ee3e3ea8cd9c144f8c07e76319039e4d747af5682629097143
SHA5127a66546e57ae50d6e79277104803f016ab81fbe38792aeb9fe326f591adad6df72bfa75efed1fa8197eb2249e763f08eda9c131f53f2db64fe8c0aa602cda225