Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86-arm-20240221-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system
  • submitted
    19-04-2024 18:38

General

  • Target

    faece6df07cccc010c8a2eaaca541bab_JaffaCakes118.apk

  • Size

    3.3MB

  • MD5

    faece6df07cccc010c8a2eaaca541bab

  • SHA1

    f9f22b1404b8088835371666493fa3f0db2ef71a

  • SHA256

    a0876d4cde77a0378cbf1ce15d188abf397b33e6d836bd5f799c798d311e2906

  • SHA512

    84a11fb311bee827104b09ba6f1ff3433f0fc34a5c24cc363e90c8ccd75f024ae885a2902f7c741a5c3049e9b61acd304218e6ff97d5c1d61c4191f643524980

  • SSDEEP

    98304:98vL6E8gsu3FIVLZC9RzzrheGseo/REQJqtFAt:98T6EvseFIJGRVeGfRSt

Malware Config

Extracted

Family

alienbot

C2

http://34.89.218.199

rc4.plain

Extracted

Family

alienbot

C2

http://34.89.218.199

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 2 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • cage.couple.say
    1⤵
    • Makes use of the framework's Accessibility service
    • Removes its main activity from the application launcher
    • Checks Android system properties for emulator presence.
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Queries account information for other applications stored on the device
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4286
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/cage.couple.say/app_DynamicOptDex/oat/x86/FyDkedD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4345

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/cage.couple.say/app_DynamicOptDex/FyDkedD.json

    Filesize

    683KB

    MD5

    093a68da9134a9cb0ed5bc43914e27c8

    SHA1

    083ce669c1ce06418eb8ae27a00065c36ec2db51

    SHA256

    33670d11885f0b2ce4377acfe56a9ffcd0e0f84c71fcbd5787686156184bc40c

    SHA512

    1df15247589cd68af60c6de6451f406a775ce79e7001b30020d0fc6cca076ab0df2d9fe84a2b4d495a504c9948168fc41229f1095e1c19b78be371112f9daa9f

  • /data/data/cage.couple.say/app_DynamicOptDex/FyDkedD.json

    Filesize

    683KB

    MD5

    fc8f5bdb82f665dcbeaccd5cfd521c17

    SHA1

    f5c2c93e2a7729d4d6e2ba5897aa762d02ca5a14

    SHA256

    9b07380e45833bf412afd51d05c8f9c6bc346ae35a33b96c9527ae1d37e1895b

    SHA512

    61765ef9a751d8545a3dc4a5068d716f17982952177ff771b9d01735ed63642496d712a573ef008eb3fa3dda26f42343771822f36c91c4f45e5fee93e7048377

  • /data/data/cage.couple.say/app_DynamicOptDex/oat/FyDkedD.json.cur.prof

    Filesize

    505B

    MD5

    7a29c1e015d111c0f06a31e313768b73

    SHA1

    26b58c31f5b735f9a9b0abbe69e1c4fd170d668b

    SHA256

    8d4ecce0fe2a3f1f09fc16dfee8f454273348d18c9407d7caccb179e83e5c739

    SHA512

    7d8609104e94207c9c58bfc4c85eb017283d8d97c50348a031bf09c7eddd0d0cad1611af84a5585338788225c1abb3da3606c58ee7a7a0e3c5b91105b112dc11

  • /data/user/0/cage.couple.say/app_DynamicOptDex/FyDkedD.json

    Filesize

    683KB

    MD5

    85e455633c6eb4fed8f63ff3d7e69465

    SHA1

    d9356f4148c7b7c3d8fc32bf128c89b3c7f8b24f

    SHA256

    3610235574f8abd55b0617628405696c79d0850cf1ca2eaf3e68743cd4102e18

    SHA512

    6af04e3e7146c341f9797379991a778f2eb6e78b8f7582f10ed1b42db320b63c4ac03cec6bdea3f844d4a4815b984d72b0e647b4d3cb0d78dcbc7a53ac0404a7