Analysis
-
max time kernel
144s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
07-04-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
e5b027f80c3acb8eb4c59cc23c0942c3_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
e5b027f80c3acb8eb4c59cc23c0942c3_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
e5b027f80c3acb8eb4c59cc23c0942c3_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
e5b027f80c3acb8eb4c59cc23c0942c3_JaffaCakes118.apk
-
Size
3.2MB
-
MD5
e5b027f80c3acb8eb4c59cc23c0942c3
-
SHA1
fb45ea1bf19cab34ec464b97802f59b9b45073ec
-
SHA256
a6c11288cb0d8c5129e3cf3b3ab1cb4263b2344acc884dff9da5dbf1027d0b42
-
SHA512
5c7b0f4cf7b7212dc7b0cd56f3a8459af5a881a375bf3ff0e1ebe58b099fa21c5b39e95cfda703493157c3c56b73504d8b7b8c242c294decdd6ef248cc7897dd
-
SSDEEP
98304:UlrkoY6RaHiXnQz9raUy7m5qjosXjDExFDEyR:mRRnQtaUscsX/sF4yR
Malware Config
Extracted
alienbot
http://34.89.151.222
Extracted
alienbot
http://34.89.151.222
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule /data/data/federal.label.business/app_DynamicOptDex/ANdqeJl.json family_cerberus /data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json family_cerberus -
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
federal.label.businessdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId federal.label.business Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId federal.label.business -
Processes:
federal.label.businesspid process 4181 federal.label.business -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
federal.label.businessdescription ioc process File opened for read /proc/cpuinfo federal.label.business -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
federal.label.businessdescription ioc process File opened for read /proc/meminfo federal.label.business -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
federal.label.business/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/federal.label.business/app_DynamicOptDex/oat/x86/ANdqeJl.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json 4181 federal.label.business /data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json 4237 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/federal.label.business/app_DynamicOptDex/oat/x86/ANdqeJl.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json 4181 federal.label.business -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
federal.label.businessdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground federal.label.business -
Queries account information for other applications stored on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
federal.label.businessdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser federal.label.business -
Acquires the wake lock 1 IoCs
Processes:
federal.label.businessdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock federal.label.business -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
federal.label.businessdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS federal.label.business
Processes
-
federal.label.business1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries account information for other applications stored on the device.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4181 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/federal.label.business/app_DynamicOptDex/ANdqeJl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/federal.label.business/app_DynamicOptDex/oat/x86/ANdqeJl.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4237
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD551683c97df89913c45ee98a4a9dc3874
SHA1993df072352c763e7d12d79ba3b1a4f8f63b5829
SHA25601bbd89c5c822c856bbabad1eeb6c4c2a7cab45512d88390a5088b0b693e3a68
SHA5122570d649886befbaa31ea32d64f5cb1fb79cb658ce61fc73680a226bc6cf2116edef5f4eea9fc81e9ff8fe8fed4ff2143cb984e7cca38f55ac6b58e58d80c38a
-
Filesize
701KB
MD50b0e52335bcc93ee0988288bac651d1c
SHA12d41d3110f778342b9f71212fe457614791acfae
SHA256578886f1bb2b34b1af170daa71c691121dad284e8b0dc211c94c51ea52bd1d1a
SHA5127c4a4b4f2f4b46a9177226d5006b66c7ac7ab7aed31c1ceb43535a93c8c4351fc28c73d5ada8bc7194ba4201bebc350c14f80293da059b02d64050f34c4d6b20
-
Filesize
517B
MD5fe5232541ac7d7c33f22f2b61a254a61
SHA11b1e6b656eb710517d5b8598aed3f2be2c932480
SHA256b3b6d55257a96c14c55c5591a92892c85d77127aa9b95ba0ff3b82ba8d99e956
SHA51232595af30e314358b601802b7645eabe71c3c3bf6bae43d5c97a7d7add6610e4e1b1298cc4d4119b227e203c29d3f389a34214157dd5a3785fb359512dd2ce51
-
Filesize
701KB
MD57cba2a89ed5ff5a94fbbb0e80d4f0c53
SHA1d0cadeae5085c7c55ccc243ee155b9a1a96a2506
SHA256dd2fb4773e5d3147e9d6e874d1c2bfe3b058aa41b7de79ed58048bdea256bb6e
SHA51257ae5e3e41af4965606f33a03563adf7a145953986bd7693e7e886057b8812bd0dd4b936f881ce19f1f1c5b2f96cb3ca27062f0f498e768dd00d4c8e9cc7204e