Analysis
-
max time kernel
148s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
19-04-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
faece6df07cccc010c8a2eaaca541bab_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
faece6df07cccc010c8a2eaaca541bab_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
faece6df07cccc010c8a2eaaca541bab_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
faece6df07cccc010c8a2eaaca541bab_JaffaCakes118.apk
-
Size
3.3MB
-
MD5
faece6df07cccc010c8a2eaaca541bab
-
SHA1
f9f22b1404b8088835371666493fa3f0db2ef71a
-
SHA256
a0876d4cde77a0378cbf1ce15d188abf397b33e6d836bd5f799c798d311e2906
-
SHA512
84a11fb311bee827104b09ba6f1ff3433f0fc34a5c24cc363e90c8ccd75f024ae885a2902f7c741a5c3049e9b61acd304218e6ff97d5c1d61c4191f643524980
-
SSDEEP
98304:98vL6E8gsu3FIVLZC9RzzrheGseo/REQJqtFAt:98T6EvseFIJGRVeGfRSt
Malware Config
Extracted
alienbot
http://34.89.218.199
Extracted
alienbot
http://34.89.218.199
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule /data/data/cage.couple.say/app_DynamicOptDex/FyDkedD.json family_cerberus /data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
cage.couple.saydescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId cage.couple.say Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId cage.couple.say -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
cage.couple.saydescription ioc process Accessed system property key: ro.product.model cage.couple.say -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
cage.couple.saydescription ioc process File opened for read /proc/cpuinfo cage.couple.say -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
cage.couple.saydescription ioc process File opened for read /proc/meminfo cage.couple.say -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
cage.couple.say/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/cage.couple.say/app_DynamicOptDex/oat/x86/FyDkedD.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json 4286 cage.couple.say /data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json 4345 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/cage.couple.say/app_DynamicOptDex/oat/x86/FyDkedD.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json 4286 cage.couple.say -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
cage.couple.saydescription ioc process Framework service call android.app.IActivityManager.setServiceForeground cage.couple.say -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
cage.couple.saydescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser cage.couple.say -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
cage.couple.saydescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone cage.couple.say -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
cage.couple.saydescription ioc process Framework service call android.app.IActivityManager.registerReceiver cage.couple.say -
Acquires the wake lock 1 IoCs
Processes:
cage.couple.saydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock cage.couple.say -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
cage.couple.saydescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS cage.couple.say
Processes
-
cage.couple.say1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries account information for other applications stored on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4286 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/cage.couple.say/app_DynamicOptDex/oat/x86/FyDkedD.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4345
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
683KB
MD5093a68da9134a9cb0ed5bc43914e27c8
SHA1083ce669c1ce06418eb8ae27a00065c36ec2db51
SHA25633670d11885f0b2ce4377acfe56a9ffcd0e0f84c71fcbd5787686156184bc40c
SHA5121df15247589cd68af60c6de6451f406a775ce79e7001b30020d0fc6cca076ab0df2d9fe84a2b4d495a504c9948168fc41229f1095e1c19b78be371112f9daa9f
-
Filesize
683KB
MD5fc8f5bdb82f665dcbeaccd5cfd521c17
SHA1f5c2c93e2a7729d4d6e2ba5897aa762d02ca5a14
SHA2569b07380e45833bf412afd51d05c8f9c6bc346ae35a33b96c9527ae1d37e1895b
SHA51261765ef9a751d8545a3dc4a5068d716f17982952177ff771b9d01735ed63642496d712a573ef008eb3fa3dda26f42343771822f36c91c4f45e5fee93e7048377
-
Filesize
505B
MD57a29c1e015d111c0f06a31e313768b73
SHA126b58c31f5b735f9a9b0abbe69e1c4fd170d668b
SHA2568d4ecce0fe2a3f1f09fc16dfee8f454273348d18c9407d7caccb179e83e5c739
SHA5127d8609104e94207c9c58bfc4c85eb017283d8d97c50348a031bf09c7eddd0d0cad1611af84a5585338788225c1abb3da3606c58ee7a7a0e3c5b91105b112dc11
-
Filesize
683KB
MD585e455633c6eb4fed8f63ff3d7e69465
SHA1d9356f4148c7b7c3d8fc32bf128c89b3c7f8b24f
SHA2563610235574f8abd55b0617628405696c79d0850cf1ca2eaf3e68743cd4102e18
SHA5126af04e3e7146c341f9797379991a778f2eb6e78b8f7582f10ed1b42db320b63c4ac03cec6bdea3f844d4a4815b984d72b0e647b4d3cb0d78dcbc7a53ac0404a7