Analysis
-
max time kernel
68s -
max time network
148s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
19-04-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
f9303b059ae1a24483e5d49dbc92e381_JaffaCakes118.apk
-
Size
3.1MB
-
MD5
f9303b059ae1a24483e5d49dbc92e381
-
SHA1
1714f02ec60a1f6332a5e189fd4c6561515e769a
-
SHA256
6b615be3461706b5e54d9bd7261894b9afbad226d5070f861aeaa5351253170c
-
SHA512
0056af0010c79f41afebcafb6a9a978974164963b3a55a856fe77f7182687b2d6481f5dee75f966294e4018afd68eb6c2acc48a168302e9aeaedea976b072625
-
SSDEEP
49152:NShcx/P8JH9F/Hg229ZkmbRH2nZT0OgFXiN2PgNv7gIVe0vI46qmEKFpOV9nujJ:cK8JdF8D7g4OAZ6gIQ346jEe02V
Malware Config
Extracted
cerberus
https://genclikbayramlari.com
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId among.govern.clever Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId among.govern.clever -
pid Process 5098 among.govern.clever -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo among.govern.clever -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo among.govern.clever -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json 5098 among.govern.clever /data/user/0/among.govern.clever/app_DynamicOptDex/uNAB.json 5098 among.govern.clever -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener among.govern.clever
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265B
MD59f4de5b2a99f0b05b34328ea227c750e
SHA1ac20cb0701e8cb146f0613e31b6907fc01ae8107
SHA256cf7044eee0eec8234f789b89a4c5cc387e72a1c438be1d6cc0cdcaa89b45f9d4
SHA512c9535534144bd154ef674c83b6a707c63c80969fa00aed50eda9933c0d5d6f856ec86de357c96610d660eee9f4ffd8a298e43dc1e31af6eabf5ec150b6593e5f
-
Filesize
731KB
MD56aa58fe7ad56b2de48a622a9b48cc75c
SHA17aa1d4189dc90da1bb183a1c6feb78f39ae4f6f5
SHA256354c6bc55496cb06e638f8a3fe41d7a6c395cc57afcb1910c00404368fc2ead9
SHA512a39139c5c717795ebf754c3590b07dee8c762fa51f6e23d5c4ba8c513672c77b97daab8fda91b4240ced0bc1886b78ee230e8384300a3ad55f78f2943d822399
-
Filesize
731KB
MD5a7a31ed29387a1c2ee483a43ed3d0963
SHA1322982df9b6cc389d06660c2190d67add79aa1cb
SHA2569fe3695eca4afb37392a65b2cb9510ac5ef33c8455bf0036a8470651d6d61f0d
SHA51259b9d3361a8883505dfacd8423d3625ca2245c8ff43b6b457462fada3dd30397997a92e062fee4f065b0e2b173bbce76634d5ebae93628ebafa504d812da3511