Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    15-12-2024 05:20

General

  • Target

    f27a16156566dd59fda402c3ce5d0928_JaffaCakes118.apk

  • Size

    3.1MB

  • MD5

    f27a16156566dd59fda402c3ce5d0928

  • SHA1

    16740f3e982c81da27a2594ffe716c0e89752d4a

  • SHA256

    b89349f430d4afe1900adcde123f11289abf2734588f5deaea856b46f503fce7

  • SHA512

    edb730d0126f9b8cf76491bb8f56bb709eb0b6cc78fd0786602a21ba6dca2be8028660f0eb6ba4f9b327b354135ea5960b324dccad3468d237dd1251288fb72b

  • SSDEEP

    98304:GHBqtoCNpM+3xwijLqoeIq6aIbAJtB9+Yeu:GHBrkv3xwiaoezZP+Yeu

Malware Config

Extracted

Family

alienbot

C2

http://95.156.227.194

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Alienbot family
  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Cerberus payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 8 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • baby.among.sustain
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries account information for other applications stored on the device
    • Performs UI accessibility actions on behalf of the user
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:4997

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/baby.among.sustain/app_DynamicOptDex/dSkHMc.json

    Filesize

    747KB

    MD5

    a45fd5887e70d51071d50312cf74713c

    SHA1

    70ba66b0fd83bf418fd8c55837a8a7646a72b335

    SHA256

    b03500e71067f8e9cee145160f7c0a8d4c0223a355f0cba73e7bd3c3ef715ef8

    SHA512

    ef66461c81ccda90eee52347d8111d73beb59358d0155771676b8d5c81ec286f62beee32bfc46a22ef5bfa751ae8c6ef3cc01256bb4c24bbb2ce09e45a8ac3d3

  • /data/data/baby.among.sustain/app_DynamicOptDex/dSkHMc.json

    Filesize

    747KB

    MD5

    6e83e311544fd9e95cb7bd24bb35c3c2

    SHA1

    06429c6d0568d3f02e4b777a453f16f037896f18

    SHA256

    8588b94d17a10801d7124440fbd470e501bbbacb47f17d6bb4160143f9c5f8c1

    SHA512

    c7d071e42112c367a67bed47067989d459505bdc181bda3a92a758c5277dbcbfe48776539b9c7146e65a2fe80f378e51b23c610d77f2959eb63b3687eb96cf9c

  • /data/data/baby.among.sustain/app_DynamicOptDex/oat/dSkHMc.json.cur.prof

    Filesize

    414B

    MD5

    63e8dd99ad278c90314b6a0b8f333863

    SHA1

    c4cfb20826338a9a77f66d984d25d7778f6df4a1

    SHA256

    b0e38cef0e8c60273512a284b1955c6b3cc39a70f3551a31db3650c21f30c6b7

    SHA512

    91e39965c925cce88abfc29b2f1739e5c8e7fd11a7aa862a0f227917e8a3a6bad96f7349459e38a1b30de62a7a9edc07fe3821a9b2b66b91a77f792d4fdeaddf