Analysis
-
max time kernel
41s -
max time network
152s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
12-04-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
eec0c54b5ed67b3932cf19b013489be3
-
SHA1
398f24c3fac339ff67c539da31ca0111eea6b596
-
SHA256
7e4fa9aeb659a9524f5b2ba4df8d806c25fc6906a6470a6911848e67905a0171
-
SHA512
9daf7307d1cb7245ee4579853e761f46cab48d8821c61ba0493efd551d624bedd5fbb4e445752699ba984a6fd861469248ae9477ab6a28cd561afe7000157cb5
-
SSDEEP
49152:gj+IF41oVBh7um7rHsEHbfTKziW+1DEiwH0vW3ZKpNNuFqMiekaQUTiK/iF:gjfKoBh7z7V7rTVEitvrIqlebrOF
Malware Config
Extracted
cerberus
http://20.90.106.208/
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.casino.shed -
pid Process 5117 com.casino.shed -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.casino.shed -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.casino.shed -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 5117 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 5117 com.casino.shed -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.casino.shed
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5f1d2b3ab6cc9507c382a8e0fe8733a4e
SHA1375206e0981363df7558ed403852f6d4f3f88463
SHA2564d62418948cbda2ee642fc60674e1267068fde9438078f1de94c32ad85082b95
SHA5125dc3701186bd2455bc60ac85839d499ff64fa97a44fb617234dc274c815b2ec5fca3254981ce66b26e1fc60293c6749d1658aa1ca9ba2b651814b8b984e33a88
-
Filesize
122KB
MD50cc01f1525356cca4d5051d3083ebd53
SHA1f20d693792f81ba6362c7ad7db9dcfd4524fb675
SHA25643b8fd005dc51f24699dc8ad1a1560331f9d35d187b7acbc8cc0b64fc3974474
SHA51203ca5b29a324dc1dcef8bb3660f64469e99bf2392754e1a5ec4634fee676f5bf2741af6c733c25fe5d5a61803006a2c802c84491463eab8d60545cfb33e7ae59