Malware Analysis Report

2025-01-19 05:18

Sample ID 211209-thd3zscef7
Target Hadise_Ifsa_build_obf.apk
SHA256 337bd9c233fb8a3a7e0eda2d33d2665e08e876e97c3066bf9e627a088cb2c2fd
Tags
cerberus banker evasion infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

337bd9c233fb8a3a7e0eda2d33d2665e08e876e97c3066bf9e627a088cb2c2fd

Threat Level: Known bad

The file Hadise_Ifsa_build_obf.apk was found to be: Known bad.

Malicious Activity Summary

cerberus banker evasion infostealer rat trojan

Cerberus

Requests dangerous framework permissions

Loads dropped Dex/Jar

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-12-09 16:03

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-12-09 16:03

Reported

2021-12-09 16:05

Platform

android-x64

Max time kernel

2683356s

Max time network

91s

Command Line

com.wood.apart

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.wood.apart

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.0:123 time.android.com udp
NL 142.250.179.202:80 play.googleapis.com tcp
US 51.81.186.22:80 51.81.186.22 tcp
US 51.81.186.22:80 51.81.186.22 tcp

Files

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1

Analysis: behavioral2

Detonation Overview

Submitted

2021-12-09 16:03

Reported

2021-12-09 16:05

Platform

android-x64

Max time kernel

2683377s

Max time network

111s

Command Line

com.wood.apart

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.wood.apart

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.8:123 time.android.com udp
US 51.81.186.22:80 51.81.186.22 tcp

Files

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1

Analysis: behavioral3

Detonation Overview

Submitted

2021-12-09 16:03

Reported

2021-12-09 16:09

Platform

android-x64

Max time kernel

2683608s

Max time network

114s

Command Line

com.wood.apart

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A
N/A /data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json N/A N/A

Reads information about phone network operator.

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.wood.apart

Network

Country Destination Domain Proto
US 172.67.146.137:443 tcp
US 1.1.1.1:853 tcp
NL 142.250.179.170:80 play.googleapis.com tcp
US 216.239.35.12:123 time.android.com udp
US 51.81.186.22:80 51.81.186.22 tcp

Files

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1

/data/user/0/com.wood.apart/app_DynamicOptDex/hFqex.json

MD5 f635c23e04ad4c2902d15a51f41e1b50
SHA1 596a4ce3dcff4e772a1e2360d68c0ddfa4506e45
SHA256 ca77493d60f73767a3971a2a78930af9607c2ccf6326f8fc9d2ad3f2e5afc2c2
SHA512 ca37381a8ff3addce5f0a1d710f0543deb508e48610edb879a23b3807be424cf8a8e5af3559eb739b952b0c0ca7984221704f4072850011abdcb58e1a1486dd1