Resubmissions
09-04-2024 14:29
240409-rtpyhshd88 10Analysis
-
max time kernel
145s -
max time network
150s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
09-04-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
-
Size
3.4MB
-
MD5
ea32dfb83dff2f55084a22624077dd6e
-
SHA1
0b994725abc116f194007865b898e981f0b41e4d
-
SHA256
9b288f10d587a1390b422e385e7813b24f51b34304ac0585242b865a7a1b9be6
-
SHA512
4491c85229d063c6c63d2ccacb08505650030767237692ad06f3fc3a527296e06d8aed09c56088f38463b3ceb31d1cedb1f06eb5a823d194f2ffe16b16d1a779
-
SSDEEP
49152:yzLDYLv2hd/i4QILkJWy2m74Hy7FBIsa9URW5cMs0UpmWQXAfhkw1eD:N2T/2jJLHvP894FMZU4WwAbsD
Malware Config
Extracted
alienbot
http://34.89.218.199
Extracted
alienbot
http://34.89.218.199
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_cerberus behavioral1/memory/4284-1.dex family_cerberus -
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId pole.crumble.burden Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId pole.crumble.burden -
pid Process 4284 pole.crumble.burden -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo pole.crumble.burden -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo pole.crumble.burden -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json 4284 pole.crumble.burden /data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json 4310 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/pole.crumble.burden/app_DynamicOptDex/oat/x86/YcB.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json 4284 pole.crumble.burden -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground pole.crumble.burden -
Queries account information for other applications stored on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser pole.crumble.burden -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock pole.crumble.burden -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS pole.crumble.burden
Processes
-
pole.crumble.burden1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries account information for other applications stored on the device.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4284 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/pole.crumble.burden/app_DynamicOptDex/oat/x86/YcB.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4310
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726KB
MD5f6252d5c666bdf8e9ac685a5321295c9
SHA1a2a167047553df7581e36652faf4d4ad7e0eb119
SHA256b3708df32aed6b4a66f729502a08283bc0a1ee49ab37801f4ad390e4af66690d
SHA512c12801c94e589ee6490fe0caf605be8a9c1566987fd777686bd703ef0d2659107adc5a50782d61ff27741bd69ab859944a809620a5993458a447bb12dbf0c823
-
Filesize
726KB
MD546302e3551aa9cd96409ca7f071ffaf8
SHA163dc0c17acba75d25cabc062b59513018164006c
SHA25689a4825b881774f89b0ec7c1549228799ddd251b1058a130f0d09c8e89a54e40
SHA512a1166d7f052c675a29c5ff527382761185313778ec5b33cf33db899e9297933ee4615ee1f019542fc5b9bfa4bd508c83c6189b66c519d7cb69ed43c52d1343fe
-
Filesize
530B
MD58ec6fbc49fc20d186e1e54873b1322cb
SHA1404ab12c4ea1d7176b1fe2f85cc50438981a99eb
SHA2560545b8d3836edd436559796a9453818b2b5c1815f0ee039fdf0ee45c58a64921
SHA512542e4bfd27db8b3324f5d0477e3c3ce4893c0a3989eaf8006e19a030d4fb595a3b47323b2492e62abdf6be5cce20fe8a60898f08fff5d11015b9e8de1c421446
-
Filesize
726KB
MD529915bb37329fb49f12ff457193a5c70
SHA128a1d617794eecb4c0b7e311e81b54c8c024b365
SHA256e9eff9d71ad09f58524d2f1c3260ab9fc05fd50e06debf4c99e03e43ea426579
SHA512673d2100b6082c9b99406594fa785500042dd339f7429910729c452362db4f0fb83e71624594c1a572f110bf263b8824079ac10abeede881034c1b8ca8632cf2