Analysis Overview
SHA256
a3e15a51c3ed4e2fea3ba38eabc2ef70e20af9e7c1d90476b2c84682172e77d8
Threat Level: Known bad
The file MOBIL_ODEME.apk was found to be: Known bad.
Malicious Activity Summary
Cerberus
Makes use of the framework's Accessibility service.
Requests dangerous framework permissions
Loads dropped Dex/Jar
Reads information about phone network operator.
Listens for changes in the sensor environment (might be used to detect emulation).
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2021-11-15 13:06
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows read access to the device's phone number(s). | android.permission.READ_PHONE_NUMBERS | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2021-11-15 13:06
Reported
2021-11-15 13:08
Platform
android-x86-arm
Max time kernel
595543s
Command Line
Signatures
Cerberus
Makes use of the framework's Accessibility service.
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
Loads dropped Dex/Jar
| Description | Indicator | Process | Target |
| N/A | /data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json | N/A | N/A |
| N/A | /data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json | N/A | N/A |
| N/A | /data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json | N/A | N/A |
Listens for changes in the sensor environment (might be used to detect emulation).
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
com.salad.budget
com.salad.budget
/system/bin/dex2oat
Network
Files
/data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json
| MD5 | 33fa5a50247a1e12e7208d5395d4e448 |
| SHA1 | dbc506623fb041a5a6e4e4d31da09199401994b1 |
| SHA256 | 85ae35ddfe0bfe51c4e0756fba60d1fe8906a580193779b0b0ee590f8e25f919 |
| SHA512 | 6e91885ab05507ca75cf35e351a4175ff416fa42fdf9acdd0fc1d846b43c5ced8136bada4e4f61cf4f9b919f01fe049933eb354e18c86a5b880dbc6c55452332 |
/data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json
| MD5 | 33fa5a50247a1e12e7208d5395d4e448 |
| SHA1 | dbc506623fb041a5a6e4e4d31da09199401994b1 |
| SHA256 | 85ae35ddfe0bfe51c4e0756fba60d1fe8906a580193779b0b0ee590f8e25f919 |
| SHA512 | 6e91885ab05507ca75cf35e351a4175ff416fa42fdf9acdd0fc1d846b43c5ced8136bada4e4f61cf4f9b919f01fe049933eb354e18c86a5b880dbc6c55452332 |
/data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json
| MD5 | 344b554461c1be4414dd46c0e9c69a86 |
| SHA1 | 7a1ea823bd041f83e49c930c9e8cb063afe6440d |
| SHA256 | f43420b7755dbee3065f37bb13179a785ae23bbffe148803c3642522043d31fe |
| SHA512 | 48238d759ea1119bf875e3b3fe8d98351e0095a3123d1883fae246d33b806e4a043cfe3175af73da694315d8f45245848807b888d6367f4b6f7f513afa2be67b |
Analysis: behavioral2
Detonation Overview
Submitted
2021-11-15 13:06
Reported
2021-11-15 13:07
Platform
android-x64-arm64
Max time network
11s
Command Line
Signatures
Processes
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:853 | tcp | |
| US | 1.1.1.1:853 | tcp | |
| NL | 142.250.27.147:443 | udp | |
| NL | 142.250.27.147:443 | udp | |
| US | 172.217.168.198:80 | ad.doubleclick.net | tcp |
Files
Analysis: behavioral3
Detonation Overview
Submitted
2021-11-15 13:06
Reported
2021-11-15 13:08
Platform
android-x64
Max time kernel
599160s
Max time network
65s
Command Line
Signatures
Cerberus
Loads dropped Dex/Jar
| Description | Indicator | Process | Target |
| N/A | /data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json | N/A | N/A |
| N/A | /data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json | N/A | N/A |
Reads information about phone network operator.
Listens for changes in the sensor environment (might be used to detect emulation).
| Description | Indicator | Process | Target |
| Framework API call | android.hardware.SensorManager.registerListener | N/A | N/A |
Processes
com.salad.budget
Network
| Country | Destination | Domain | Proto |
| US | 1.1.1.1:853 | tcp | |
| US | 216.239.35.0:123 | time.android.com | udp |
| US | 1.1.1.1:853 | tcp | |
| US | 104.21.95.145:443 | yokyokdandanyokdandandanand.space | tcp |
Files
/data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json
| MD5 | 33fa5a50247a1e12e7208d5395d4e448 |
| SHA1 | dbc506623fb041a5a6e4e4d31da09199401994b1 |
| SHA256 | 85ae35ddfe0bfe51c4e0756fba60d1fe8906a580193779b0b0ee590f8e25f919 |
| SHA512 | 6e91885ab05507ca75cf35e351a4175ff416fa42fdf9acdd0fc1d846b43c5ced8136bada4e4f61cf4f9b919f01fe049933eb354e18c86a5b880dbc6c55452332 |
/data/user/0/com.salad.budget/app_DynamicOptDex/sbprTt.json
| MD5 | 33fa5a50247a1e12e7208d5395d4e448 |
| SHA1 | dbc506623fb041a5a6e4e4d31da09199401994b1 |
| SHA256 | 85ae35ddfe0bfe51c4e0756fba60d1fe8906a580193779b0b0ee590f8e25f919 |
| SHA512 | 6e91885ab05507ca75cf35e351a4175ff416fa42fdf9acdd0fc1d846b43c5ced8136bada4e4f61cf4f9b919f01fe049933eb354e18c86a5b880dbc6c55452332 |