Analysis
-
max time kernel
2146781s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
14-10-2021 17:58
Static task
static1
Behavioral task
behavioral1
Sample
Androidupdate.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
Androidupdate.apk
-
Size
2.6MB
-
MD5
eec0c54b5ed67b3932cf19b013489be3
-
SHA1
398f24c3fac339ff67c539da31ca0111eea6b596
-
SHA256
7e4fa9aeb659a9524f5b2ba4df8d806c25fc6906a6470a6911848e67905a0171
-
SHA512
9daf7307d1cb7245ee4579853e761f46cab48d8821c61ba0493efd551d624bedd5fbb4e445752699ba984a6fd861469248ae9477ab6a28cd561afe7000157cb5
Malware Config
Extracted
Family
cerberus
C2
http://20.90.106.208/
Signatures
-
Checks Android system properties for emulator presence. 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.casino.shed -
Loads dropped Dex/Jar 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4781 com.casino.shed /data/user/0/com.casino.shed/app_DynamicOptDex/QRr.json 4781 com.casino.shed /product/app/TrichromeLibrary/TrichromeLibrary.apk 4781 com.casino.shed /product/app/TrichromeLibrary/TrichromeLibrary.apk 4781 com.casino.shed -
Uses reflection 8 IoCs
description pid Process Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4781 com.casino.shed