Analysis
-
max time kernel
55s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
12-04-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
eec0c54b5ed67b3932cf19b013489be3_JaffaCakes118.apk
-
Size
2.6MB
-
MD5
eec0c54b5ed67b3932cf19b013489be3
-
SHA1
398f24c3fac339ff67c539da31ca0111eea6b596
-
SHA256
7e4fa9aeb659a9524f5b2ba4df8d806c25fc6906a6470a6911848e67905a0171
-
SHA512
9daf7307d1cb7245ee4579853e761f46cab48d8821c61ba0493efd551d624bedd5fbb4e445752699ba984a6fd861469248ae9477ab6a28cd561afe7000157cb5
-
SSDEEP
49152:gj+IF41oVBh7um7rHsEHbfTKziW+1DEiwH0vW3ZKpNNuFqMiekaQUTiK/iF:gjfKoBh7z7V7rTVEitvrIqlebrOF
Malware Config
Extracted
cerberus
http://20.90.106.208/
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.casino.shed Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.casino.shed -
pid Process 4442 com.casino.shed -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.casino.shed -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.casino.shed -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4442 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4442 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4442 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4442 com.casino.shed -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.casino.shed -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.casino.shed
Processes
-
com.casino.shed1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4442
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5f1d2b3ab6cc9507c382a8e0fe8733a4e
SHA1375206e0981363df7558ed403852f6d4f3f88463
SHA2564d62418948cbda2ee642fc60674e1267068fde9438078f1de94c32ad85082b95
SHA5125dc3701186bd2455bc60ac85839d499ff64fa97a44fb617234dc274c815b2ec5fca3254981ce66b26e1fc60293c6749d1658aa1ca9ba2b651814b8b984e33a88
-
Filesize
122KB
MD50cc01f1525356cca4d5051d3083ebd53
SHA1f20d693792f81ba6362c7ad7db9dcfd4524fb675
SHA25643b8fd005dc51f24699dc8ad1a1560331f9d35d187b7acbc8cc0b64fc3974474
SHA51203ca5b29a324dc1dcef8bb3660f64469e99bf2392754e1a5ec4634fee676f5bf2741af6c733c25fe5d5a61803006a2c802c84491463eab8d60545cfb33e7ae59
-
Filesize
168B
MD50e443f2b286c0791495075cdbff0d1c5
SHA1f8788e7b31700834360af2c6d8964cb224ecd9ec
SHA2561c6de480ec48890b03ae5831e970e44de449bfce55d2496b7385845242ed2be7
SHA5127e1c23f01cc7ae39958646ef406917a5299caec2785abce04cef09e341d2578ad801055589cff33f6e1d0d13033a9e7a6a7d5e080eb5766dfcbdc86d3d20f3b1