Analysis
-
max time kernel
142s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-10-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
Resource
android-x64-20240624-en
General
-
Target
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
-
Size
3.8MB
-
MD5
7c5e83a49bbe44113c444524cbe7124b
-
SHA1
3c03d0bfc54f5fccf029f14f9a996c70d4f16014
-
SHA256
c10a976dabb58f3ea812ed548287842a65903214ac1a92bf2d499f87787a50f8
-
SHA512
dee77a1910bb6e552aef192e1cca5fa02277db5fb79de8522735429baa8b3ec7b0dbcb03eaab707c441e01f52828d7828a7089dd37b05023ceaf80b57c7e877c
-
SSDEEP
98304:8Cu1BeWBFCXIaVzW8lOqX/31qbm8fGH7b/5:4I7dV1qGbbx
Malware Config
Extracted
alienbot
http://rndhsadjersxexdd.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Processes:
understanding.subsidy.questionnairepid process 4308 understanding.subsidy.questionnaire 4308 understanding.subsidy.questionnaire 4308 understanding.subsidy.questionnaire -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/oat/x86/SNxnXY.odex --compiler-filter=quicken --class-loader-context=&understanding.subsidy.questionnaireioc pid process /data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json 4333 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/oat/x86/SNxnXY.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json 4308 understanding.subsidy.questionnaire -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText understanding.subsidy.questionnaire Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId understanding.subsidy.questionnaire Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId understanding.subsidy.questionnaire -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser understanding.subsidy.questionnaire -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock understanding.subsidy.questionnaire -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.app.IActivityManager.setServiceForeground understanding.subsidy.questionnaire -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
understanding.subsidy.questionnaireioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone understanding.subsidy.questionnaire -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS understanding.subsidy.questionnaire -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.app.IActivityManager.registerReceiver understanding.subsidy.questionnaire -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
understanding.subsidy.questionnairedescription ioc process Framework service call android.app.job.IJobScheduler.schedule understanding.subsidy.questionnaire -
Checks CPU information 2 TTPs 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process File opened for read /proc/cpuinfo understanding.subsidy.questionnaire -
Checks memory information 2 TTPs 1 IoCs
Processes:
understanding.subsidy.questionnairedescription ioc process File opened for read /proc/meminfo understanding.subsidy.questionnaire
Processes
-
understanding.subsidy.questionnaire1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4308 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/oat/x86/SNxnXY.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4333
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
563KB
MD5ed38674de2c76109cb0e993489b42ffc
SHA1010886708c1c2d076c6f856561e7073ce2b5b98f
SHA256ff812cae7494ff099e79bfc0e01e25fcf2b5b8aeb5d555aa53a0039410ae1812
SHA5125c49cd218b159c09c45533eec43cdd49b17ba8d77f8f1eaacccacdf1b8c84b20e6bbf163b08e18fcca8f5ddd658143d238254d313fb15c125a48f0b15ed29381
-
Filesize
563KB
MD5a74a31acd507a4a191947dd907a2001a
SHA188c72e9475dfe34043dce4f775a507048e0082d6
SHA256581e446ed87c42f2d811856fd012733901e88e85d535fec173c1ea96ee0402c8
SHA51265d4296135da67cdd165a477f9dcfbaa43c095b3b28070f7e80eabf0ac50a9b3c84118d2405690b15dfad61edf1ee52f7107e5dbdf7cddf5e969a2561b00b35b
-
Filesize
1KB
MD5a19331ca4b1d8d0a81cd7a95d98986aa
SHA170ebc5941245e7e6116077dc73c7f4b333937547
SHA256a9aa1ddea7e423d96086b81e94cbbd24f996afedeaa79217b72fb1895310548d
SHA5124711020239927951ac0c0b4f08354e922d03234fb5dee6c524b8a2a5690fa40ac384b8ac5bf307f17de4579acbd916a5e6c8a8f105e6f5c83a0f0091ffdf8a96
-
Filesize
767KB
MD5f162b202771aa21727f1404b3f479791
SHA16cbeaeda1b91434bc85c646211f6ba6c9f7f82ed
SHA2566930b31674810296b1740e8a00d827011650ebd82099d6ad9a7428c5195bc70d
SHA5122ce87e92e5b01ab3301e0b9f76d141ad9db1bacb1a8f5a8132ff31b0f91b997e84a78adcf4c2d6021c16c7dd7d6fd97a23fa8cb2da3b8a13a21b68975cab5658
-
Filesize
767KB
MD5e05d87daa998d977061397a0140e9528
SHA1e7510c986edf30a66f8f7091f82fb062007062a8
SHA25672cb3743d4259011529a2727c31eb7fe791166fefaa44d6f8a2d40e5c093097e
SHA5124077bc7ac1125b0ab8e035377188c5b3eb331502bc1f379fa604dd8b1fd9912569b28a55c9d6cb7ae2596ec68231c425b925cd4767a6f9c17d34effb013ba856