Analysis
-
max time kernel
137s -
max time network
146s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-10-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
Resource
android-x64-20240624-en
General
-
Target
7c5e83a49bbe44113c444524cbe7124b_JaffaCakes118.apk
-
Size
3.8MB
-
MD5
7c5e83a49bbe44113c444524cbe7124b
-
SHA1
3c03d0bfc54f5fccf029f14f9a996c70d4f16014
-
SHA256
c10a976dabb58f3ea812ed548287842a65903214ac1a92bf2d499f87787a50f8
-
SHA512
dee77a1910bb6e552aef192e1cca5fa02277db5fb79de8522735429baa8b3ec7b0dbcb03eaab707c441e01f52828d7828a7089dd37b05023ceaf80b57c7e877c
-
SSDEEP
98304:8Cu1BeWBFCXIaVzW8lOqX/31qbm8fGH7b/5:4I7dV1qGbbx
Malware Config
Extracted
alienbot
http://rndhsadjersxexdd.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
pid Process 4975 understanding.subsidy.questionnaire 4975 understanding.subsidy.questionnaire -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model understanding.subsidy.questionnaire -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/understanding.subsidy.questionnaire/app_DynamicOptDex/SNxnXY.json 4975 understanding.subsidy.questionnaire -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId understanding.subsidy.questionnaire Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText understanding.subsidy.questionnaire Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId understanding.subsidy.questionnaire -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener understanding.subsidy.questionnaire -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser understanding.subsidy.questionnaire -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock understanding.subsidy.questionnaire -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground understanding.subsidy.questionnaire -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction understanding.subsidy.questionnaire -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone understanding.subsidy.questionnaire -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver understanding.subsidy.questionnaire -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule understanding.subsidy.questionnaire -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo understanding.subsidy.questionnaire -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo understanding.subsidy.questionnaire
Processes
-
understanding.subsidy.questionnaire1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4975
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
563KB
MD5ed38674de2c76109cb0e993489b42ffc
SHA1010886708c1c2d076c6f856561e7073ce2b5b98f
SHA256ff812cae7494ff099e79bfc0e01e25fcf2b5b8aeb5d555aa53a0039410ae1812
SHA5125c49cd218b159c09c45533eec43cdd49b17ba8d77f8f1eaacccacdf1b8c84b20e6bbf163b08e18fcca8f5ddd658143d238254d313fb15c125a48f0b15ed29381
-
Filesize
563KB
MD5a74a31acd507a4a191947dd907a2001a
SHA188c72e9475dfe34043dce4f775a507048e0082d6
SHA256581e446ed87c42f2d811856fd012733901e88e85d535fec173c1ea96ee0402c8
SHA51265d4296135da67cdd165a477f9dcfbaa43c095b3b28070f7e80eabf0ac50a9b3c84118d2405690b15dfad61edf1ee52f7107e5dbdf7cddf5e969a2561b00b35b
-
Filesize
390B
MD50ed6e1b2591f70bab21d9cb44d041d54
SHA124010283a0e0820e142b7964bf7cdb921dfee110
SHA256108ab9428cd45f26989132f12a9db518910b398bdd23ffd98c1faf4f5f3dca21
SHA5127208f5016b2513c9956a29f2320371ff6d231db808e58218563673877a32499f005a0a54045dfe74c1234b74a671b3aeba44f6cc06a8043c9dc3141af9ebd5a0
-
Filesize
767KB
MD5e05d87daa998d977061397a0140e9528
SHA1e7510c986edf30a66f8f7091f82fb062007062a8
SHA25672cb3743d4259011529a2727c31eb7fe791166fefaa44d6f8a2d40e5c093097e
SHA5124077bc7ac1125b0ab8e035377188c5b3eb331502bc1f379fa604dd8b1fd9912569b28a55c9d6cb7ae2596ec68231c425b925cd4767a6f9c17d34effb013ba856