Analysis
-
max time kernel
53s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
18-04-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
f8567f94a252a4956cbde1a225a42806_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f8567f94a252a4956cbde1a225a42806_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f8567f94a252a4956cbde1a225a42806_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
f8567f94a252a4956cbde1a225a42806_JaffaCakes118.apk
-
Size
3.2MB
-
MD5
f8567f94a252a4956cbde1a225a42806
-
SHA1
d1a69e55726b0e6cf2cf9b3a5fe81dfacaac4035
-
SHA256
2d59d13c81deb0a756c202a9719e5e6886107e6f16691a3bac2ec7a7f6d19c4e
-
SHA512
3418a521c4fbd1e898b05d094920a5547a6627fdc2382bdc1da0507cd31cab99f0f1cf39e14233e1c2efc1647a2ed3c802d12cfbf167770a55d0f8c168777d1e
-
SSDEEP
98304:U6eWpuWxBhnvFRMkTyh9REUNAI75t1XVPv7r4O:FVpu0LvzMkURrWO5t1Xl75
Malware Config
Extracted
cerberus
http://bahsatbayykxyz.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId repeat.census.source Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId repeat.census.source -
pid Process 4183 repeat.census.source -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo repeat.census.source -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo repeat.census.source -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/repeat.census.source/app_DynamicOptDex/DX.json 4183 repeat.census.source /data/user/0/repeat.census.source/app_DynamicOptDex/DX.json 4183 repeat.census.source -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS repeat.census.source -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener repeat.census.source
Processes
-
repeat.census.source1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4183
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD5f54007e2cfad3fb12435a4f347682c01
SHA1c876923059a1437bc3f163aebcb8059b06728875
SHA25611ac09e446e41e326e311988d9eaebd3fd6f8488336d3854d999a8264eb7e822
SHA5126f1655fe7986de8359f6b1e21ad1b6ef62bab87b7accf0f9967f805bf112d7955149fe5c19685d2ccf21bb5f08065d00bf82837965517da50d942c0718db21d6
-
Filesize
648KB
MD5d6ab4362b7a7e80d2bb58da3f8a7787e
SHA1135378c336110d278e7a1f24030ed7c0048598b9
SHA256e0ab38a440abcd2753054916b6e06cd05e041fee17887862435cf076de53d94c
SHA5123806b96cab4f347ef3f3ea25029fc6cbbcd314191b448827b462d87e3ffca3214d42e8fab45047ed9bdb30cbbf8351eed4403eb5b002c74e50f5a020005be425
-
Filesize
263B
MD5ad0bfe45ebd01fabc20f1ace70ef42af
SHA1fadeaad86a9ca3618a22a382f6f6e14db98df2fc
SHA2565b71ab17dd2d20a2df0d34a9a026a131ce57278fde3f5aa131ccb5d2d9411945
SHA5122c90a64ab38007b8428efea5d86f4023dca30b69bc31d348317ee5370e3f15232e9d5050aa5e55a272c2e5931a01051495ba72b5c1b330ca63b936b44f7809eb