Analysis
-
max time kernel
134s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
15-10-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
493b35f8fae4f4d06e36e98082560f4f_JaffaCakes118.apk
-
Size
3.6MB
-
MD5
493b35f8fae4f4d06e36e98082560f4f
-
SHA1
eff6ed1e028eef7e7d987b6e14c44ac3a828629a
-
SHA256
ac2cb2c60ede6b43143cf2b98d56932d3f5c97aee0c5f4319e5539203cece079
-
SHA512
f41399a73a4169218564de4bae3f54cb6886d90f4b6d35200ee48ac3a3f11ace2c5f73fc08047c42f727618ac536f7354cf6ae1605e21537f486712b3691a04d
-
SSDEEP
98304:moYHqJY+PhhqidZzR8sD3p3uq/ZAl8lEDw:QEPh8idZV8sD3FTZq6Gw
Malware Config
Extracted
alienbot
http://rndhsadjersxexdd.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/garden.Soviet.carbon/app_DynamicOptDex/YWUALlpGNxnCqPA.json 4341 garden.Soviet.carbon -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId garden.Soviet.carbon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId garden.Soviet.carbon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText garden.Soviet.carbon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser garden.Soviet.carbon -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock garden.Soviet.carbon -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground garden.Soviet.carbon -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction garden.Soviet.carbon -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS garden.Soviet.carbon -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule garden.Soviet.carbon
Processes
-
garden.Soviet.carbon1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4341
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5064ae709730531e65fd80a8791844fb7
SHA120b8cda6e62dfa0aba44fdc936c7ee8c7061c637
SHA2569a797a8cd64479d60a20f3da5bcbb559a7f2f58a6971168f54d0891602d34144
SHA5120ef0b33792b95de3b2b3477d3a08f4daad60ff3ba530500e83c7d4493b690dbe8f684dfe05657f1aa543b25a0ca857d2bdbb0aa7f39daec6af25ba58512f041a
-
Filesize
564KB
MD5bf59cb30d338df86aaa65cd50c43e25d
SHA14f97395f5a69064b607c02482433b465d1167dee
SHA256d4e3e821645974f5fd9b028ef0ba570476076bcc5193aa37cd221553f94d4fef
SHA512477955e47f0d9a6f390e47aa31ba0816aa3f0196be9d47ba02057eeaf2fdd41c7f110d678251c1b44f46f75da34095977e5add69654fa039d00ddb347b94ab03
-
Filesize
767KB
MD56427b5bc340dd58e0e0760cf41741e6d
SHA17abfe8b374fcc4bf262226e7a8370bcffb3f852f
SHA2562b0b3be826276b792d4851b118b0faaa2d563fe239a83dc74e2c8a0501534255
SHA512caf892e863acb34d98624d928a4d7d7657c67d84078d4b6ba5288b631c69c143fd025cd1aa911c790456307e9460bc33a67f70eb3dafb80d0b75091ac76a5ac8
-
Filesize
311B
MD588eab9568ea56e4fad81181d3deeeb05
SHA1ead91939d02345d15942e099815936002e5e026e
SHA256e782a3fd48287c7ec8af4fff35e91d37fd2ad5319c17dff4cd3a4d92cdbfad55
SHA512708e3a045a88b67071b4b847949b2d19f36876d4776d1897c23d09abc8bb7a6add7fa221287ccc34d561b0fea042e3d98a3f4a6229f268e38198fa807ae48eba