Analysis

  • max time kernel
    139s
  • max time network
    141s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    25-10-2024 00:33

General

  • Target

    757be08495745e8f90e97d33fa946aff_JaffaCakes118.apk

  • Size

    2.6MB

  • MD5

    757be08495745e8f90e97d33fa946aff

  • SHA1

    0a7af3d293c4bc9fa142e714f5be6f774aa0a112

  • SHA256

    f808d05653ae38eef70954a583c9cacdf5d43bd28e73e689174d47c73e431da6

  • SHA512

    a49c67ea1f2b92f0bd30c699567198033c5e0712474d77674cbed3127429dfe2b5a208b6b35141c91d3eb3360a970992929a28887d38ed90cfd06177af5694a2

  • SSDEEP

    49152:dDFzDxnFGJvAMs5oC/kW2njHqN1EdJue2NV3zBDb32XIFtPWs3Sn:JFzDxnU+5HylepBfGXNj

Malware Config

Extracted

Family

alienbot

C2

http://194.163.136.78

rc4.plain

Extracted

Family

alienbot

C2

http://194.163.136.78

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • video.typical.scrap
    1⤵
    • Removes its main activity from the application launcher
    • Checks Android system properties for emulator presence.
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:4261
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/video.typical.scrap/app_DynamicOptDex/jZ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/video.typical.scrap/app_DynamicOptDex/oat/x86/jZ.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4289

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    99ca162c256d1f74e74580a3110a05c3

    SHA1

    5626499829471270feac4413bfb807eb3a71bbce

    SHA256

    f2f00291c5dc5c33697dbaa02239985ab8d060687445f67c158ff62786793e4b

    SHA512

    c8791671cd895556c72fb7eb47001326c115133486191c38c8d97295f30f70d498ccaabe3b4f7270234bad4c434842b77ca715a04173408d56ab9b562cf113eb

  • /data/data/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    33f1dd56e54c4dcb29c2bcf0aa11bd86

    SHA1

    349040d578a550a758c8d6cae15f9a0e2d525f43

    SHA256

    d6ecf45bf1f6b71cc285cba4b477f891552ce3b1e2d75c3713e663164ae43729

    SHA512

    2a0a2e785a8c48eff88ec5b2106f8481c5ff10d13d15fb7bf381d8f1952cdc37c2c4e8af095ad018bdaf89da18f2d07e03073c5a4e1019626297431ad57fbbb4

  • /data/data/video.typical.scrap/app_DynamicOptDex/oat/jZ.json.cur.prof

    Filesize

    518B

    MD5

    f6c62f09520658b77de715265fcaeafe

    SHA1

    3345aade01b8159a6c43676ddd75111272b67e8c

    SHA256

    0dd18bd27408eb8fbd32bcf29531d1a0ade8bedafbc4dc1271884576c93cf486

    SHA512

    09c98d01cd830d28b7e9ee5b7a2b6a7170da55540d0e04a9c52c0cac7fdae3e2d02cccb7a29c058485bafbfbf19712ad5b7241d2976a77e0e4d4526b62c22eb0

  • /data/user/0/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    895c0d1c6e1afda80de0e1ab58352ab1

    SHA1

    ea56923edaf4e33af4f36ad6f6d4dd8ac7937689

    SHA256

    5a1a0d0b74acfa9287482af5dfee607dbad45a92c441e1861f311d3bf16252a7

    SHA512

    29b2d34d88cb8215884705bca0a7b3ca7574a4755fba767edff9c4f172257f35bcf2c1d2f56b0a73b2b77a97160c498fbea4a7eab897477ff299f42a251691c0