Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    29-10-2024 18:12

General

  • Target

    7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk

  • Size

    3.8MB

  • MD5

    7c5e83a49bbe44113c444524cbe7124b

  • SHA1

    3c03d0bfc54f5fccf029f14f9a996c70d4f16014

  • SHA256

    c10a976dabb58f3ea812ed548287842a65903214ac1a92bf2d499f87787a50f8

  • SHA512

    dee77a1910bb6e552aef192e1cca5fa02277db5fb79de8522735429baa8b3ec7b0dbcb03eaab707c441e01f52828d7828a7089dd37b05023ceaf80b57c7e877c

  • SSDEEP

    98304:8Cu1BeWBFCXIaVzW8lOqX/31qbm8fGH7b/5:4I7dV1qGbbx

Malware Config

Extracted

Family

alienbot

C2

http://rndhsadjersxexdd.xyz

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Alienbot family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • understanding.subsidy.questionnaire
    1⤵
    • Removes its main activity from the application launcher
    • Checks Android system properties for emulator presence.
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:4975

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json

    Filesize

    563KB

    MD5

    ed38674de2c76109cb0e993489b42ffc

    SHA1

    010886708c1c2d076c6f856561e7073ce2b5b98f

    SHA256

    ff812cae7494ff099e79bfc0e01e25fcf2b5b8aeb5d555aa53a0039410ae1812

    SHA512

    5c49cd218b159c09c45533eec43cdd49b17ba8d77f8f1eaacccacdf1b8c84b20e6bbf163b08e18fcca8f5ddd658143d238254d313fb15c125a48f0b15ed29381

  • /data/data/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json

    Filesize

    563KB

    MD5

    a74a31acd507a4a191947dd907a2001a

    SHA1

    88c72e9475dfe34043dce4f775a507048e0082d6

    SHA256

    581e446ed87c42f2d811856fd012733901e88e85d535fec173c1ea96ee0402c8

    SHA512

    65d4296135da67cdd165a477f9dcfbaa43c095b3b28070f7e80eabf0ac50a9b3c84118d2405690b15dfad61edf1ee52f7107e5dbdf7cddf5e969a2561b00b35b

  • /data/data/understanding.subsidy.questionnaire/app_DynamicOptDex/oat/SNxnXY.json.cur.prof

    Filesize

    390B

    MD5

    0ed6e1b2591f70bab21d9cb44d041d54

    SHA1

    24010283a0e0820e142b7964bf7cdb921dfee110

    SHA256

    108ab9428cd45f26989132f12a9db518910b398bdd23ffd98c1faf4f5f3dca21

    SHA512

    7208f5016b2513c9956a29f2320371ff6d231db808e58218563673877a32499f005a0a54045dfe74c1234b74a671b3aeba44f6cc06a8043c9dc3141af9ebd5a0

  • /data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json

    Filesize

    767KB

    MD5

    e05d87daa998d977061397a0140e9528

    SHA1

    e7510c986edf30a66f8f7091f82fb062007062a8

    SHA256

    72cb3743d4259011529a2727c31eb7fe791166fefaa44d6f8a2d40e5c093097e

    SHA512

    4077bc7ac1125b0ab8e035377188c5b3eb331502bc1f379fa604dd8b1fd9912569b28a55c9d6cb7ae2596ec68231c425b925cd4767a6f9c17d34effb013ba856