Analysis

  • max time kernel
    177s
  • max time network
    183s
  • platform
    android_x86
  • resource
    android-x86-arm-20240514-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system
  • submitted
    24-05-2024 23:06

General

  • Target

    7017aa9e98dde58decb20cf282f41966_JaffaCakes118.apk

  • Size

    1.6MB

  • MD5

    7017aa9e98dde58decb20cf282f41966

  • SHA1

    f7886adbeeee400405190bc8f1138f0251da6772

  • SHA256

    d3aa03c40cee78be1d0c6d3276f25d6ace02a8002b52b4a150cab2b8678642e7

  • SHA512

    dcca64f26967aee98ac362d95f66ca2c428f0c48cb2e6b038d4d255375b8bc31f1ee8801355d1adf6f49dd05bf870d8106badae3378c81b2572f7809eda2646b

  • SSDEEP

    49152:JybHTQZnRJbO2t2YBjcLiDdE4C1W6r/ArsFMjL9:EbH2RZOjViDdE91WO/cuMv9

Malware Config

Extracted

Family

alienbot

C2

http://binsletr.net/

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 2 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • xytdg.jskjrldzqhcyz.snozwrglkzgz
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Removes its main activity from the application launcher
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Queries account information for other applications stored on the device
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4327
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/ZBQdKM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/oat/x86/ZBQdKM.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4352

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/ZBQdKM.json

    Filesize

    704KB

    MD5

    9551a1c75fba71bfadc181141a5c8600

    SHA1

    121a931b4faf36dbf39be2fee9ef1155c0d0393a

    SHA256

    581c29cbb0ad738578bcd537c9c1f81bdad24c68e6053e70108df753efa12afa

    SHA512

    70a84e7c908e7fcd1114b6961c7ba6a52045dbb8e290cec9d7b63d788ca3e481f3c91f16dffde95600a96eeb8625d4ff7b5f7040013acee7dcf6aaf82443a6bf

  • /data/data/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/ZBQdKM.json

    Filesize

    704KB

    MD5

    4054b191907ae1057c5cd3c0fd5685fe

    SHA1

    814872e52d98b24f34dbf1761e3ba11ca65e1383

    SHA256

    e12823ef26ffba5e1e04f08648ff9cd099215d6bceacbd824d7c42a4e3a6d063

    SHA512

    70b2de00d4bb0455d273cc64ac643b9222cc0be30437ecea1f046155cdfc119e37d7070ed270f571c872f032d5f681d3235c56f347de24984da9835be43137d6

  • /data/data/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/oat/ZBQdKM.json.cur.prof

    Filesize

    515B

    MD5

    c22973c0790ea789de23f484800613e0

    SHA1

    5ee0a9846ac60471c2f51fdc94e35e09049e9778

    SHA256

    022226688a57fe59c8f4f56b507d4e55afb3c1ce89005194ac75ba8c64623109

    SHA512

    58ea61abad1c43ce6c0563683a53e198bc847adce9145629b724a62d19e192b7e6ba9d2c5df8f3e8a391a47513bb78c4409d4eb7f2cf6447640a39a27d226038

  • /data/user/0/xytdg.jskjrldzqhcyz.snozwrglkzgz/app_DynamicOptDex/ZBQdKM.json

    Filesize

    704KB

    MD5

    06a802d91643b1eb3e4654604b47b9a2

    SHA1

    32254e52802f6f2d2408ebae44430771b83b21ac

    SHA256

    25ad86bc06805e2381941267a3f860d6d56443cb2a5d19635ac616cc6f862a2b

    SHA512

    04061824619143beb9af76b839585bf94d1665aae6afab5fcbfb322efb6d6d7ebcb79b874c1634e62ed8720ed935a503387f466b8e0c682b6a4986cb9fdb9041