Analysis
-
max time kernel
142s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
15-10-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
-
Size
3.6MB
-
MD5
493b35f8fae4f4d06e36e98082560f4f
-
SHA1
eff6ed1e028eef7e7d987b6e14c44ac3a828629a
-
SHA256
ac2cb2c60ede6b43143cf2b98d56932d3f5c97aee0c5f4319e5539203cece079
-
SHA512
f41399a73a4169218564de4bae3f54cb6886d90f4b6d35200ee48ac3a3f11ace2c5f73fc08047c42f727618ac536f7354cf6ae1605e21537f486712b3691a04d
-
SSDEEP
98304:moYHqJY+PhhqidZzR8sD3p3uq/ZAl8lEDw:QEPh8idZV8sD3FTZq6Gw
Malware Config
Extracted
alienbot
http://rndhsadjersxexdd.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
pid Process 4313 garden.Soviet.carbon 4313 garden.Soviet.carbon 4313 garden.Soviet.carbon -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/garden.Soviet.carbon/app_DynamicOptDex/YWUALlpGNxnCqPA.json 4338 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/garden.Soviet.carbon/app_DynamicOptDex/YWUALlpGNxnCqPA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/garden.Soviet.carbon/app_DynamicOptDex/oat/x86/YWUALlpGNxnCqPA.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/garden.Soviet.carbon/app_DynamicOptDex/YWUALlpGNxnCqPA.json 4313 garden.Soviet.carbon -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText garden.Soviet.carbon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId garden.Soviet.carbon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId garden.Soviet.carbon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser garden.Soviet.carbon -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock garden.Soviet.carbon -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground garden.Soviet.carbon -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone garden.Soviet.carbon -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS garden.Soviet.carbon -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver garden.Soviet.carbon -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule garden.Soviet.carbon -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo garden.Soviet.carbon -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo garden.Soviet.carbon
Processes
-
garden.Soviet.carbon1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4313 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/garden.Soviet.carbon/app_DynamicOptDex/YWUALlpGNxnCqPA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/garden.Soviet.carbon/app_DynamicOptDex/oat/x86/YWUALlpGNxnCqPA.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4338
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5064ae709730531e65fd80a8791844fb7
SHA120b8cda6e62dfa0aba44fdc936c7ee8c7061c637
SHA2569a797a8cd64479d60a20f3da5bcbb559a7f2f58a6971168f54d0891602d34144
SHA5120ef0b33792b95de3b2b3477d3a08f4daad60ff3ba530500e83c7d4493b690dbe8f684dfe05657f1aa543b25a0ca857d2bdbb0aa7f39daec6af25ba58512f041a
-
Filesize
564KB
MD5bf59cb30d338df86aaa65cd50c43e25d
SHA14f97395f5a69064b607c02482433b465d1167dee
SHA256d4e3e821645974f5fd9b028ef0ba570476076bcc5193aa37cd221553f94d4fef
SHA512477955e47f0d9a6f390e47aa31ba0816aa3f0196be9d47ba02057eeaf2fdd41c7f110d678251c1b44f46f75da34095977e5add69654fa039d00ddb347b94ab03
-
Filesize
1KB
MD5dfdd5d498a5d6cd4ca661de484f867d9
SHA1d03eeb38c6d290dc2588eb1d5803705375023776
SHA256ff44f7a755b4c8a808fd1b5e1f7133266ad12fc497d08d2d9478fcee14c19a0f
SHA5129087f9f34e95bac3a83018d500b32e30f78e833dcec1b7d1694fde93051276048513269078775ad69e809d31652bad8ed1594942f19339d2af3281160925c86e
-
Filesize
767KB
MD5b253a4b7c84dd415085d256a5023037a
SHA1f2a04ec92d580918279f6f68b8002cb2524957f6
SHA256f7633a3c721aee3cb17d6e1a163698b12f84fd4462e54bc85e3bc85189f85879
SHA512887699695644c262024e08e62df3b529a6c0cf39841fb4d89c9167c38dae644c8cef091c63aa1c444f623041e38a0a2c88ae5f3230d59687b1b9a2cda295a755
-
Filesize
767KB
MD56427b5bc340dd58e0e0760cf41741e6d
SHA17abfe8b374fcc4bf262226e7a8370bcffb3f852f
SHA2562b0b3be826276b792d4851b118b0faaa2d563fe239a83dc74e2c8a0501534255
SHA512caf892e863acb34d98624d928a4d7d7657c67d84078d4b6ba5288b631c69c143fd025cd1aa911c790456307e9460bc33a67f70eb3dafb80d0b75091ac76a5ac8