Analysis
-
max time kernel
140s -
max time network
141s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
18-12-2024 13:14
Static task
static1
Behavioral task
behavioral1
Sample
fbadda1aea91b50a5adc6b855b8bbfa4_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fbadda1aea91b50a5adc6b855b8bbfa4_JaffaCakes118.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
fbadda1aea91b50a5adc6b855b8bbfa4_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
fbadda1aea91b50a5adc6b855b8bbfa4_JaffaCakes118.apk
-
Size
2.9MB
-
MD5
fbadda1aea91b50a5adc6b855b8bbfa4
-
SHA1
80df44dcf743100119e8acbd936a7651887061bd
-
SHA256
d5686b96ed9847a7b5184b70ef9401c3295f50682ad12a9127eb87ec4b4d2feb
-
SHA512
97a117024efcb7e076bce91950784a0ceacd8573a286d69164e21ba662e9957f429ad5121e68c4920b24649c6b326fce6327aa920cbd4c9e6041605ba4ecd7b8
-
SSDEEP
49152:uPdQCR7d+XwoUcT740McyPqFaHUVP6nfl56PyqQSZYfFbdWpHZWsTMKNn7E3Mk:ctgXwodMNgjU956qqQSZYfFb6HRTM38k
Malware Config
Extracted
alienbot
http://194.163.136.78
Extracted
alienbot
http://194.163.136.78
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_cerberus behavioral1/memory/4247-1.dex family_cerberus -
pid Process 4247 bachelor.desk.version -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/bachelor.desk.version/app_DynamicOptDex/MnFHiEy.json 4247 bachelor.desk.version /data/user/0/bachelor.desk.version/app_DynamicOptDex/MnFHiEy.json 4272 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/bachelor.desk.version/app_DynamicOptDex/MnFHiEy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/bachelor.desk.version/app_DynamicOptDex/oat/x86/MnFHiEy.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/bachelor.desk.version/app_DynamicOptDex/MnFHiEy.json 4247 bachelor.desk.version -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId bachelor.desk.version Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId bachelor.desk.version -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser bachelor.desk.version -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock bachelor.desk.version -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground bachelor.desk.version -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction bachelor.desk.version android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction bachelor.desk.version -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone bachelor.desk.version -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS bachelor.desk.version -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver bachelor.desk.version -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule bachelor.desk.version -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo bachelor.desk.version -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo bachelor.desk.version
Processes
-
bachelor.desk.version1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4247 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/bachelor.desk.version/app_DynamicOptDex/MnFHiEy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/bachelor.desk.version/app_DynamicOptDex/oat/x86/MnFHiEy.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4272
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD5629fd011536d57fd48855a79a8e81adc
SHA18af3a590cf9593cd03504b37573fddad89c7c557
SHA256baf9806357d61e6e451e75650eec0385bed0e74c87812107fda63f35628acfe3
SHA51278ece321d214547cb143413a0952e875d0646d2ab74c0eae3c3b673daf728f4f529612752ca49a589afa933270bea22ea6e2d027d4543b1193fe18c6d6cbd3b0
-
Filesize
697KB
MD5660d53e8aab29da942ba4728544f49a6
SHA14fdc19a08166d93d527b653786451161d958252b
SHA256353e1b2d19562411aff4966064c9704be08f280fc77070e5dc78bac4b2046d2f
SHA5125b879c83d90b0a3b5d19e8fe5381f42bc9de0ea5cd1833f2e2053c2271f8f8ce1e95460c34107cbc2a9a63a56502a6c8187c2f7af792a015aa5d9eb6b652b3a5
-
Filesize
469B
MD52c1c428dca95044a43f9944e5081a431
SHA1946b4a49f7f8b30427e022e46a32dd7e7152da36
SHA256041308560f6e494236daf17d0d514ceb6a11a420a28bf48752a59c68a51c72e4
SHA512c09a18be136b0cbcbf5f15fe979eda010f0618b28e526c27c220470552e8dafe0590d03542c1434c8517042002b6793cb95b186f1e111157d503f6abd7d70001
-
Filesize
697KB
MD5d44ddb1dd222b1f559ae99ea4711afcf
SHA16af08eb6cc327813b995a60ebb232fd88c303763
SHA256d6fae06b0e5761aba5465b078f42ba1d5dbbdfbeb9e02e07f37a4b6834130666
SHA5128d34ecdd97540ae8620c12f74502a1d45ffc4e174605f12b7c924932d357021df9c312d37e72003d0c0c3e83ec16f4bc7d99bf4108dc66d9f9a05b04672bdb72