Analysis
-
max time kernel
52s -
max time network
133s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
12-04-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
eec0c54b5ed67b3932cf19b013489be3
-
SHA1
398f24c3fac339ff67c539da31ca0111eea6b596
-
SHA256
7e4fa9aeb659a9524f5b2ba4df8d806c25fc6906a6470a6911848e67905a0171
-
SHA512
9daf7307d1cb7245ee4579853e761f46cab48d8821c61ba0493efd551d624bedd5fbb4e445752699ba984a6fd861469248ae9477ab6a28cd561afe7000157cb5
-
SSDEEP
49152:gj+IF41oVBh7um7rHsEHbfTKziW+1DEiwH0vW3ZKpNNuFqMiekaQUTiK/iF:gjfKoBh7z7V7rTVEitvrIqlebrOF
Malware Config
Extracted
cerberus
http://20.90.106.208/
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.casino.shed -
pid Process 4267 com.casino.shed -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.casino.shed -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.casino.shed -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4267 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4292 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.casino.shed/app_DynamicOptDex/oat/x86/QRr.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4267 com.casino.shed -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.casino.shed -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.casino.shed
Processes
-
com.casino.shed1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4267 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.casino.shed/app_DynamicOptDex/oat/x86/QRr.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4292
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5f1d2b3ab6cc9507c382a8e0fe8733a4e
SHA1375206e0981363df7558ed403852f6d4f3f88463
SHA2564d62418948cbda2ee642fc60674e1267068fde9438078f1de94c32ad85082b95
SHA5125dc3701186bd2455bc60ac85839d499ff64fa97a44fb617234dc274c815b2ec5fca3254981ce66b26e1fc60293c6749d1658aa1ca9ba2b651814b8b984e33a88
-
Filesize
122KB
MD50cc01f1525356cca4d5051d3083ebd53
SHA1f20d693792f81ba6362c7ad7db9dcfd4524fb675
SHA25643b8fd005dc51f24699dc8ad1a1560331f9d35d187b7acbc8cc0b64fc3974474
SHA51203ca5b29a324dc1dcef8bb3660f64469e99bf2392754e1a5ec4634fee676f5bf2741af6c733c25fe5d5a61803006a2c802c84491463eab8d60545cfb33e7ae59
-
Filesize
848B
MD539da87b7d7ad6634ff4ccc1577e6f802
SHA115fbbd80921318f29b6c8a238ad5baad137d9d34
SHA256d507591fddb12ece56b355e5d0105fdcab22fa538b6a913889df2ba16081bc30
SHA51208a273f7f9d3b2ab05368a41296f34a69443678404494ea31a0e939cab4fb28fdbeed95c05df56245f44a64c4c57a37bb5a7da6ee2ad4e7ac1bcd3a938f94e07
-
Filesize
122KB
MD50e78771cdcb39eee675ffefa3769c28c
SHA1219d220148172d745c2fa21dd60fb800aa45c0ce
SHA2560911778c375d104d8f9b86ca25d5af4b9e0d19139b3a7707c44366ef6f1b5629
SHA5125cb061e7acbca1af555dd6fee67be93e18a902a2c6672642cf18140716d79e0a684c47487565773ef7174eb83332148c4f07e9f4d5a1579e631a79dfddce25cc