Analysis
-
max time kernel
87s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
19-04-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
-
Size
3.1MB
-
MD5
f9303b059ae1a24483e5d49dbc92e381
-
SHA1
1714f02ec60a1f6332a5e189fd4c6561515e769a
-
SHA256
6b615be3461706b5e54d9bd7261894b9afbad226d5070f861aeaa5351253170c
-
SHA512
0056af0010c79f41afebcafb6a9a978974164963b3a55a856fe77f7182687b2d6481f5dee75f966294e4018afd68eb6c2acc48a168302e9aeaedea976b072625
-
SSDEEP
49152:NShcx/P8JH9F/Hg229ZkmbRH2nZT0OgFXiN2PgNv7gIVe0vI46qmEKFpOV9nujJ:cK8JdF8D7g4OAZ6gIQ346jEe02V
Malware Config
Extracted
cerberus
https://genclikbayramlari.com
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId among.govern.clever Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId among.govern.clever -
pid Process 4302 among.govern.clever -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo among.govern.clever -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo among.govern.clever -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json 4302 among.govern.clever /data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json 4327 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/among.govern.clever/app_DynamicOptDex/oat/x86/uNAB.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json 4302 among.govern.clever -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS among.govern.clever -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener among.govern.clever
Processes
-
among.govern.clever1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4302 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/among.govern.clever/app_DynamicOptDex/oat/x86/uNAB.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4327
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
891B
MD5cce3b8e9959d80987343a77b6ddb9c16
SHA1589eb24c0dfe94dd090f173be883ee44ca9d9aee
SHA256f3fa0578e4c261357c5625855f326d4edea1e33fdd34de96788ce83d63257f4d
SHA5120d08f7a3ce5092c6ccbd838241dc4959d2360ec85b6139ab78d830cf553489fd46ea86e344a4a859bc5f0c2987699201018d34072ac407e49c9ae1fedfae28a7
-
Filesize
731KB
MD56aa58fe7ad56b2de48a622a9b48cc75c
SHA17aa1d4189dc90da1bb183a1c6feb78f39ae4f6f5
SHA256354c6bc55496cb06e638f8a3fe41d7a6c395cc57afcb1910c00404368fc2ead9
SHA512a39139c5c717795ebf754c3590b07dee8c762fa51f6e23d5c4ba8c513672c77b97daab8fda91b4240ced0bc1886b78ee230e8384300a3ad55f78f2943d822399
-
Filesize
731KB
MD5a7a31ed29387a1c2ee483a43ed3d0963
SHA1322982df9b6cc389d06660c2190d67add79aa1cb
SHA2569fe3695eca4afb37392a65b2cb9510ac5ef33c8455bf0036a8470651d6d61f0d
SHA51259b9d3361a8883505dfacd8423d3625ca2245c8ff43b6b457462fada3dd30397997a92e062fee4f065b0e2b173bbce76634d5ebae93628ebafa504d812da3511
-
Filesize
731KB
MD5775cb687916869ba8f5d21c4cb369a3f
SHA1a151073ee419bd804514a0d0dceb102c145b2bb3
SHA2568b603ff92437802a4a7d37bf77c22e295a5998e26bedbed5972cd5b7f35a14d2
SHA51250d992f3893cb016814b630de7cbb84e04543634bc21dd1c2104af0b929437d5cfa7855e1c08bc5fcf51b0b98d34973484a4c9e8ba040bac9c086c7de34567b2