Resubmissions
09-04-2024 14:29
240409-rtpyhshd88 10Analysis
-
max time kernel
158s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
09-04-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
ea32dfb83dff2f55084a22624077dd6e_JaffaCakes118.apk
-
Size
3.4MB
-
MD5
ea32dfb83dff2f55084a22624077dd6e
-
SHA1
0b994725abc116f194007865b898e981f0b41e4d
-
SHA256
9b288f10d587a1390b422e385e7813b24f51b34304ac0585242b865a7a1b9be6
-
SHA512
4491c85229d063c6c63d2ccacb08505650030767237692ad06f3fc3a527296e06d8aed09c56088f38463b3ceb31d1cedb1f06eb5a823d194f2ffe16b16d1a779
-
SSDEEP
49152:yzLDYLv2hd/i4QILkJWy2m74Hy7FBIsa9URW5cMs0UpmWQXAfhkw1eD:N2T/2jJLHvP894FMZU4WwAbsD
Malware Config
Extracted
alienbot
http://34.89.218.199
Extracted
alienbot
http://34.89.218.199
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/pole.crumble.burden/app_DynamicOptDex/YcB.json family_cerberus -
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
pole.crumble.burdendescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId pole.crumble.burden Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId pole.crumble.burden -
Processes:
pole.crumble.burdenpid process 5116 pole.crumble.burden 5116 pole.crumble.burden 5116 pole.crumble.burden 5116 pole.crumble.burden 5116 pole.crumble.burden 5116 pole.crumble.burden 5116 pole.crumble.burden -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
pole.crumble.burdenioc pid process /data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json 5116 pole.crumble.burden /data/user/0/pole.crumble.burden/app_DynamicOptDex/YcB.json 5116 pole.crumble.burden -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
pole.crumble.burdendescription ioc process Framework service call android.app.IActivityManager.setServiceForeground pole.crumble.burden -
Queries account information for other applications stored on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
pole.crumble.burdendescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser pole.crumble.burden -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
pole.crumble.burdendescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock pole.crumble.burden
Processes
-
pole.crumble.burden1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries account information for other applications stored on the device.
- Acquires the wake lock
PID:5116
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726KB
MD5f6252d5c666bdf8e9ac685a5321295c9
SHA1a2a167047553df7581e36652faf4d4ad7e0eb119
SHA256b3708df32aed6b4a66f729502a08283bc0a1ee49ab37801f4ad390e4af66690d
SHA512c12801c94e589ee6490fe0caf605be8a9c1566987fd777686bd703ef0d2659107adc5a50782d61ff27741bd69ab859944a809620a5993458a447bb12dbf0c823
-
Filesize
726KB
MD546302e3551aa9cd96409ca7f071ffaf8
SHA163dc0c17acba75d25cabc062b59513018164006c
SHA25689a4825b881774f89b0ec7c1549228799ddd251b1058a130f0d09c8e89a54e40
SHA512a1166d7f052c675a29c5ff527382761185313778ec5b33cf33db899e9297933ee4615ee1f019542fc5b9bfa4bd508c83c6189b66c519d7cb69ed43c52d1343fe
-
Filesize
429B
MD5e20371b4aa21790f6100006bbcf1effe
SHA14628d4a5d418fad67028b10e43ea57a67263de28
SHA256b89528ef24496fd3bdabe4a667525cefef6d3adc0003f9ab749c584fef1004b4
SHA512c36a485ff6c59873a67dd9925fc1be58f1667612c622ab40370e6ae04e85aeaabbec87749cf4d605ca12144492fa747d16cf8ce270ea1a6f0fb600eeb9900b6f