Analysis
-
max time kernel
148s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
19-10-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
5e8fbf5138cb86522cfc8891f637af8b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5e8fbf5138cb86522cfc8891f637af8b_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5e8fbf5138cb86522cfc8891f637af8b_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
5e8fbf5138cb86522cfc8891f637af8b_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
5e8fbf5138cb86522cfc8891f637af8b
-
SHA1
749412b843bfd62210b8ef47e5ee4527c7d97abe
-
SHA256
3b4d55a0aaf3ea759e6aaf5229b7b87bd870ee37863d10b1d2f286c742e0add0
-
SHA512
8f5de80e97da44be96755670717eac230904255c2e79c4c33f66d97c9262da5c13b3938478d24bc6f8f4190fde37441fcf59474489a64ea5cf889d47f9b05cb9
-
SSDEEP
49152:lbBRZhP56mpt9MADbnfK/tP6QJmV8WZ7HFmE670F9m/3ehYRDxoupSHNVEBQTHme:lvP56EWADbniw8D70avehWDxZpSHNVE+
Malware Config
Extracted
alienbot
http://194.163.136.78
Extracted
alienbot
http://194.163.136.78
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/popular.roast.slow/app_DynamicOptDex/eQ.json family_cerberus -
Processes:
popular.roast.slowpid process 4945 popular.roast.slow 4945 popular.roast.slow 4945 popular.roast.slow 4945 popular.roast.slow 4945 popular.roast.slow 4945 popular.roast.slow 4945 popular.roast.slow -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
popular.roast.slowioc pid process /data/user/0/popular.roast.slow/app_DynamicOptDex/eQ.json 4945 popular.roast.slow /data/user/0/popular.roast.slow/app_DynamicOptDex/eQ.json 4945 popular.roast.slow -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
popular.roast.slowdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId popular.roast.slow Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId popular.roast.slow -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
popular.roast.slowdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser popular.roast.slow -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
popular.roast.slowdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock popular.roast.slow -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
popular.roast.slowdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground popular.roast.slow -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
popular.roast.slowioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction popular.roast.slow android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction popular.roast.slow -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
popular.roast.slowdescription ioc process Framework service call android.app.IActivityManager.registerReceiver popular.roast.slow -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
popular.roast.slowdescription ioc process Framework service call android.app.job.IJobScheduler.schedule popular.roast.slow
Processes
-
popular.roast.slow1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4945
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD5b02290572cba4ae810c16e5a7545b0ba
SHA121bed143f93ae9ca734150eb83aa3cadf26c9825
SHA256647bd9419a1fd6634473e3a385799478a75a90ab183a90f6034b70c6ac8f6e5f
SHA512824282591b40636d0bec7bcc8c0b892d42a1bf4843b01abcc7a93fc612097e5a3bd04a4f7b1fff7e13843934f517873ed5dc9f0b532087a58d6f76f4810ff4e9
-
Filesize
665KB
MD5e8016eb81d199579c71c9304d8257c7a
SHA13443ca802f19d82d7fe5ec72163d6b612ef49cdf
SHA25672606804df52bca4a8769f76701c86100b4d657a6f75df9225e16cc26188f9c4
SHA512d4ee0842850dba1eb811845ea92db25775c3d5a810930ab35de54b2ab56502fe32162eca988e123e802c6945849d691c525d36bf950430774fd509cc81e7af62
-
Filesize
417B
MD56f4dc889a16aad8102f28cb23332a21c
SHA1a8c9a1ef8ce541ff7501af0f1eb439870f2b2300
SHA2561c72a98a2e1b658e249b16da57162ddd852207a7872d1191a5ebc7bca65aefb1
SHA51221873c2b9d45598231b31992fa259eb9f509a4f422d9c58504128dd5b430ac6bbbc42e150e26aa115edf81d814219ff280c663ff66c3b681096bf8573c1d2af4