Resubmissions
10-04-2024 07:36
240410-jfml8sga85 10Analysis
-
max time kernel
155s -
max time network
145s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
10-04-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
ea911124defd4bf8d63aba29b0a04ed9_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ea911124defd4bf8d63aba29b0a04ed9_JaffaCakes118.apk
Resource
android-x64-20240221-en
General
-
Target
ea911124defd4bf8d63aba29b0a04ed9_JaffaCakes118.apk
-
Size
4.3MB
-
MD5
ea911124defd4bf8d63aba29b0a04ed9
-
SHA1
de6bdb3f1153e95fbf3b4aff904616ff8340e681
-
SHA256
dad6cdcd782dc3daf5cf1dbdd82c58336af18b33a87be3f19b0833e547fe90a5
-
SHA512
1458992047473bdb3aed2e1db675495a2924e70d8ff087e487d140ffaa46c0bec78c0d30f96a24eba4aa09bfce81230e531af817e2ff5332bfe8b60e365a7cd0
-
SSDEEP
98304:qdK5aHKd+5ZEy/U8cZID5oLO50zISGdo/vIlZPB2S/kP8:2qdry88cm1ELmkvIlZPB258
Malware Config
Extracted
alienbot
http://2tn54bh60mp4mlpqo4k2.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
consult.steam.sciencedescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId consult.steam.science Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText consult.steam.science Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId consult.steam.science -
Processes:
consult.steam.sciencepid process 5086 consult.steam.science 5086 consult.steam.science 5086 consult.steam.science -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
consult.steam.sciencedescription ioc process File opened for read /proc/cpuinfo consult.steam.science -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
consult.steam.sciencedescription ioc process File opened for read /proc/meminfo consult.steam.science -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
consult.steam.scienceioc pid process /data/user/0/consult.steam.science/app_DynamicOptDex/ztHLIhRJZdnHVSVV.json 5086 consult.steam.science -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
consult.steam.sciencedescription ioc process Framework service call android.app.IActivityManager.setServiceForeground consult.steam.science -
Queries account information for other applications stored on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
consult.steam.sciencedescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser consult.steam.science -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
consult.steam.sciencedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock consult.steam.science
Processes
-
consult.steam.science1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries account information for other applications stored on the device.
- Acquires the wake lock
PID:5086
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59c6fdd57480d0bf6024cb68aa4a39bfd
SHA14a8404f9e1eb15157730993114cb2fcf9c03b180
SHA256b22bd0ee7265c4beecb679a1a81d8b05d2eb5aac10b27ca1c3aff12a8379897f
SHA512b08f46037960640faf6ba650ee484070f641a34b336eb1a148b968e4095915eb7b8176f44a1ad0f82ca1d15284b83f1c6a62b07db51101c0755b7d476bb4d7f5
-
Filesize
615KB
MD5788dc5589ddd492e2f75d923bc99fc7f
SHA18a39ea2c26e33155d14b58315b0a15205c69cd12
SHA256d65479c34c57d31585cae064b695a6995f09d196a1365752e1d60d1d20eb124c
SHA51209d3719bfaea2f418ee08f9303de80c7d6fc0846f240b31cbfc0957ee74845cf0f62d4121b81a1c5da87c1e0e249db9f88695202e07be56074011c417015a183
-
Filesize
615KB
MD5d6308e6919bc6105666b7408eccfddd6
SHA12176d97ccd50617444f87fde99261dd27b9f20a8
SHA25644d8d4914b38114bb2709393d1e27ed9cf0c1013ce72e2e0a047692143174a47
SHA5126b6ea11456e23771743d51345e09f6879270e5ec51e2cdaa65eb319e27c2c6156037dba92f57b36fadec80950a6339f0442d0bdc775bcb99670898578b40cbd5
-
Filesize
768KB
MD52467245b4df7be36945d49f5dc872a24
SHA1aa208a9b144172b76a6a46d780bcbb5ce6352ad0
SHA256fa7c8dedb8a5db3e0828f6e68d2d5832bc7c3b34f7b2ca86159ba1d30a311c06
SHA51274f975e4ff7569645bd7dab09b4dd5c193f024a8961e7bdd466b6ee432d0f768cf75a76cc763ab40f56752a1a107dfbb9f9a4f77801625dd67955ce6ae524aa5