Analysis
-
max time kernel
140s -
max time network
147s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-10-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
35262b4f3d7b7c0dea8066ffeac03c99_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
35262b4f3d7b7c0dea8066ffeac03c99_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
35262b4f3d7b7c0dea8066ffeac03c99_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
35262b4f3d7b7c0dea8066ffeac03c99_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
35262b4f3d7b7c0dea8066ffeac03c99
-
SHA1
cdc4b26c859979fc8283c1888f36584086cfcb99
-
SHA256
2a0009f47d4f68c7812fab90522ec41db9fbf921fe3d239f92655412da07a975
-
SHA512
1c71a31e5795cb649e99bf06de893537f18b7ae5f12886f538b1fd143979bd83d75e2fda6c25bcfec9322ef4e4930a4fb2612f1ad8296bf0e37245af332ea98d
-
SSDEEP
49152:tDxSR1g3LWoWJZUMOfoQUI8WSyh+0pHTO+FsNUaKLDmqxS3K4mWiDHUgpmNzVOPI:t7LWouZQ9UFWfbxZcKLDmI0KHfgNBf
Malware Config
Extracted
alienbot
http://194.163.136.78
Extracted
alienbot
http://194.163.136.78
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule /data/data/begin.hard.wisdom/app_DynamicOptDex/hO.json family_cerberus /data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json family_cerberus -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process Accessed system property key: ro.product.model begin.hard.wisdom -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
begin.hard.wisdom/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/oat/x86/hO.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json 4240 begin.hard.wisdom /data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json 4266 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/oat/x86/hO.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json 4240 begin.hard.wisdom -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId begin.hard.wisdom Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId begin.hard.wisdom -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser begin.hard.wisdom -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock begin.hard.wisdom -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground begin.hard.wisdom -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
begin.hard.wisdomioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction begin.hard.wisdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction begin.hard.wisdom -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone begin.hard.wisdom -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS begin.hard.wisdom -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.app.IActivityManager.registerReceiver begin.hard.wisdom -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
begin.hard.wisdomdescription ioc process Framework service call android.app.job.IJobScheduler.schedule begin.hard.wisdom -
Checks CPU information 2 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process File opened for read /proc/cpuinfo begin.hard.wisdom -
Checks memory information 2 TTPs 1 IoCs
Processes:
begin.hard.wisdomdescription ioc process File opened for read /proc/meminfo begin.hard.wisdom
Processes
-
begin.hard.wisdom1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4240 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/hO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/begin.hard.wisdom/app_DynamicOptDex/oat/x86/hO.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4266
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
698KB
MD594ec9ce81e54c962ebdbb2dc45738425
SHA12784908c45a7c638d4f17fa72c4ccae97185f593
SHA25695899e6bf56935e1a2a88fe8b95d7cc2fa79372955026b7875e3aa498f241b6e
SHA5120f88227fbf4f5dda15f9fc9fe3dd4ebf45b73448c7dab8ed820a7463f6264caf7d7c59296e8936c0175886cdd39f1925e9b650bb3f78a406d60e0cd094149677
-
Filesize
698KB
MD52abf47fa609ea0ce2a15494b43009863
SHA1335a8129ff1b3ef53336e12cd65d3a264c857ba3
SHA25610cd63d672f58c51ca4c01c86d4a2a6783e554d57baecb04b3f21256eb4ab653
SHA512ad786c6b948e71d82e1d166ece2d988cfaab776cfe57414e32881f14a6d4e644614e9eeb27425c6456af9f784aabf4fc7528e3c00f557481bbf9513195624d65
-
Filesize
520B
MD50b0c19b8533897488ac4b42a73aadd34
SHA1ec3bc9aff4dea901744aa7c777daca8217d8b517
SHA256c911dbabc598fdfad4265ea5619e9eee4c680f1cc36e09e52c39ba9a0e1a2a00
SHA5123d0790a8ac7a9953d91c2c99c054956e901e4786ad9e852dcbc8a0dd32860065ce70dc4391288a3943433df73ce217487b671dcaf852edc3f7388443f73cb65b
-
Filesize
698KB
MD5a67c64bb10e38673fbb7b1f0a1bd1e67
SHA1a5a12a42cbd45cfa5a7d7b09ef077392abd69eb1
SHA256d707b4ecc118712ed18ee691e31820b7da65fdbceed64816392842c0a35444ac
SHA5125bdb49f3111f751c833adbc6eefa8c7403a9f82dce725c52f30d4ceafcd9166faa3e29dcdb3f01c3afc5a4d41e6192ed72ea9e8480f99ed19f1ffdb9f54c00b9