Malware Analysis Report

2025-01-19 05:17

Sample ID 211209-cbwwsabhcp
Target Android_Guncelleme.apk
SHA256 70fa3acaa97e9f65611a622fe73d2dc6e5839136663bc16a7b32b6016809c53d
Tags
cerberus banker evasion infostealer rat suricata trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

70fa3acaa97e9f65611a622fe73d2dc6e5839136663bc16a7b32b6016809c53d

Threat Level: Known bad

The file Android_Guncelleme.apk was found to be: Known bad.

Malicious Activity Summary

cerberus banker evasion infostealer rat suricata trojan

Cerberus

suricata: ET MALWARE Generic Request to gate.php Dotted-Quad

suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

Requests dangerous framework permissions

Loads dropped Dex/Jar

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-12-09 01:54

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-12-09 01:54

Reported

2021-12-09 01:56

Platform

android-x64

Max time kernel

2632440s

Max time network

93s

Command Line

com.oven.such

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

suricata: ET MALWARE Generic Request to gate.php Dotted-Quad

suricata

suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

suricata

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.oven.such

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.8:123 time.android.com udp
MY 185.187.169.161:80 185.187.169.161 tcp

Files

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

Analysis: behavioral2

Detonation Overview

Submitted

2021-12-09 01:54

Reported

2021-12-09 01:56

Platform

android-x64

Max time kernel

2632468s

Max time network

119s

Command Line

com.oven.such

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

suricata: ET MALWARE Generic Request to gate.php Dotted-Quad

suricata

suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

suricata

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.oven.such

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
NL 216.58.208.106:80 play.googleapis.com tcp
NL 216.58.208.106:80 play.googleapis.com tcp
US 216.239.35.4:123 time.android.com udp
MY 185.187.169.161:80 185.187.169.161 tcp

Files

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

Analysis: behavioral3

Detonation Overview

Submitted

2021-12-09 01:54

Reported

2021-12-09 01:57

Platform

android-x64

Max time kernel

2632522s

Max time network

70s

Command Line

com.oven.such

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

suricata: ET MALWARE Generic Request to gate.php Dotted-Quad

suricata

suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

suricata

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A
N/A /data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json N/A N/A
N/A /data/data/com.oven.such/app_apk/system.apk N/A N/A
N/A /data/data/com.oven.such/app_apk/system.apk N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.oven.such

Network

Country Destination Domain Proto
MY 185.187.169.161:80 tcp
US 1.1.1.1:853 tcp
MY 185.187.169.161:80 185.187.169.161 tcp
US 216.239.35.0:123 time.android.com udp
MY 185.187.169.161:80 185.187.169.161 tcp

Files

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

/data/user/0/com.oven.such/app_DynamicOptDex/tGMlNM.json

MD5 c9cfc32f99276f41e773fa1bf4ba8a58
SHA1 d5bd9e98bb9a94f5ea8da960e0d1a642a2c9213c
SHA256 8b5950ecdf46d7d091a5f91c7fc07d801b3a45787653f5044f501e50b4f0da9b
SHA512 fc0431e7c04a6ec4df5fb2efc91022af21ba20df20c1229861ee4fbca542a76015d0ae8cad78eeb731585e4c56f494da79d1dc906fd7cccb2f94e48aea1fce67

/data/data/com.oven.such/app_apk/system.apk

MD5 69b3ca57adef18f47b71ce651769abf4
SHA1 7204f2b55b577cadc557a4074c29831e313662d6
SHA256 26533562f7e9db5feafc571f9cea03cc80fcd2917ebb0744de30fb8dec12141b
SHA512 22713beed0583876a801eeef1e13a5677025567866e898fedb8201befdab3a4d88de759a410bcb00f7ba8261a10cce977328d536436989b051df6495998a31f1

/data/data/com.oven.such/app_apk/system.apk