Analysis
-
max time kernel
70s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
10-04-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
-
Size
2.7MB
-
MD5
ebc1e608080227a13f173612ae3136e1
-
SHA1
18770445ea731c509beb7322a98c0477f7b8d87c
-
SHA256
00ec32ae4b2f32c99a8053fb0b7a5dacdfdad2fa1981f058919cc484b4a5924c
-
SHA512
0a2b51f02b2916598d0c8d6b4d33b24d8f2adbb34d1ba81eaaadd1420acc68c8e6e73e875ed337a14b57192798395617fb18f2691fa6744865d96834ef0b618f
-
SSDEEP
49152:YxHjSl9QRd4g6nRw8ysPcwf0THzCUIfuI5MX/OUeav6oOMor7uU:YxHWURd4gARwPwWzC7fdi2UWrMu7f
Malware Config
Extracted
cerberus
http://161.97.68.93
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.shrimp.major Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.shrimp.major -
pid Process 5085 com.shrimp.major -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.shrimp.major -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.shrimp.major -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.shrimp.major/app_DynamicOptDex/wfSM.json 5085 com.shrimp.major /data/user/0/com.shrimp.major/app_DynamicOptDex/wfSM.json 5085 com.shrimp.major -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.shrimp.major
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785B
MD54291359875eb44e9fe9bf6d87538ef8e
SHA198e4fcd9d0f15234aab15a21d3ccee2c17c20180
SHA256f715839ca5060d3b340f5db7fa503f4ef208fbf5ed4c415d707dc56ca24fe2cd
SHA512d75b91d8a9478af14b51d3a260885a5720da923dc11d466963967e8b93d539af0bb3683ea72193c84c066afb2f50a8c29465c6755d70ca57ae162a3b7c4a97f3
-
Filesize
124KB
MD50fdf0bad6af9c55a59774f3e3c30e82e
SHA1fe9a88bce40dfb4ea4928a3a0b240154156d61dd
SHA2569616376ed229a77502057e5858f2bf46651362f7c8f2f43cd04cebf59d9216c9
SHA512607389a8d96f306e243d9cfcd6b94b8125ca14da05cb8f8c2fe13ba387d614ce25f0baeea63cebf3bd3c3f390359cdc486a60252ea549811b66ddf6fa22de435
-
Filesize
124KB
MD514566c640d4f373f498f98babe63912f
SHA174b042d5a511b86530d0b57a1e060acac002d161
SHA25635007d1bb65015580669e71282624802506498e6d3d7b7413ff13dbccddbe85c
SHA5125c693dbcde1f3e88b7f08df42fad8a6d16f91d48eea4c272d8de3a2666f12a0553c0921967b90a49f65a981e98175fd3ce332217a97ceb6a4fb04d0a43917715