Analysis
-
max time kernel
60s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
14-12-2024 09:37
Static task
static1
Behavioral task
behavioral1
Sample
ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118.apk
-
Size
133KB
-
MD5
ee2370e2a1a7f85a99ece79d33a51b6b
-
SHA1
cfd04ada3f64ae25667fe63dac1a7908070559ec
-
SHA256
075352f0f8ac06163f06380fba36d778046e5c9ce3ffa15ef082f2ea1fec09eb
-
SHA512
f0a73e930f289f65f811dc71fe2e0d8478f2a59f0666878dc6a85053d49e2271aeff874add80f1b348e4ac4043ed608bb66bd7966ba962cdc91bdee6f28d6453
-
SSDEEP
3072:Cdk1gubPqNARcwz7qCeCM0cuLuIQ2XzXcvIQ:PREARo0covQ2jsvIQ
Malware Config
Extracted
cerberus
https://bensiznekadarmutluolabilirsinki.club
Signatures
-
Cerberus family
-
pid Process 4743 com.swivvtvzoky.ktmuzxo -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.swivvtvzoky.ktmuzxo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.swivvtvzoky.ktmuzxo -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.swivvtvzoky.ktmuzxo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.swivvtvzoky.ktmuzxo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.swivvtvzoky.ktmuzxo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.swivvtvzoky.ktmuzxo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.swivvtvzoky.ktmuzxo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.swivvtvzoky.ktmuzxo -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.swivvtvzoky.ktmuzxo -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.swivvtvzoky.ktmuzxo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.swivvtvzoky.ktmuzxo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.swivvtvzoky.ktmuzxo
Processes
-
com.swivvtvzoky.ktmuzxo1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4743
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1