Malware Analysis Report

2025-01-19 05:17

Sample ID 220114-1h3jxabbaj
Target Android_Guncelleme_63af26.apk
SHA256 63af2652e1fd2e405ff3c0c2bf156ad2c0a54d2a6210cf41e2d22535c4d82d8d
Tags
cerberus banker evasion infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

63af2652e1fd2e405ff3c0c2bf156ad2c0a54d2a6210cf41e2d22535c4d82d8d

Threat Level: Known bad

The file Android_Guncelleme_63af26.apk was found to be: Known bad.

Malicious Activity Summary

cerberus banker evasion infostealer rat trojan

Cerberus

Requests dangerous framework permissions

Loads dropped Dex/Jar

Listens for changes in the sensor environment (might be used to detect emulation).

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-14 21:39

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-14 21:39

Reported

2022-01-14 21:43

Platform

android-x64

Max time kernel

1519057s

Max time network

159s

Command Line

com.shuffle.expire

Signatures

Cerberus

banker trojan infostealer evasion rat cerberus

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.shuffle.expire/app_DynamicOptDex/SeQGnq.json N/A N/A
N/A /data/user/0/com.shuffle.expire/app_DynamicOptDex/SeQGnq.json N/A N/A

Listens for changes in the sensor environment (might be used to detect emulation).

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Processes

com.shuffle.expire

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 51.81.187.9:80 tcp
US 51.81.187.9:80 tcp
US 1.1.1.1:853 tcp
US 51.81.187.9:80 tcp
US 51.81.187.9:80 tcp
US 51.81.187.9:80 tcp
US 51.81.187.9:80 tcp
US 51.81.187.9:80 tcp
US 1.1.1.1:853 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 172.217.168.196:80 tcp
NL 142.251.39.100:80 tcp
NL 142.251.39.100:80 tcp
NL 142.251.39.100:80 tcp
NL 142.251.39.100:80 tcp
NL 142.251.39.100:80 www.google.com tcp
NL 142.251.36.33:443 tcp
NL 142.251.36.33:443 tcp
NL 142.251.36.46:443 tcp
NL 142.251.36.46:443 tcp
NL 216.58.214.14:443 tcp
NL 216.58.214.14:443 tcp

Files

/data/user/0/com.shuffle.expire/app_DynamicOptDex/SeQGnq.json

MD5 9a0e28e9e8e2f8cdc4d1cdc3ccd6d2b1
SHA1 f3e6c8eb6935e467be6e144415abeaaec4bf92b3
SHA256 402007882ca80a88aaca5e5f848d66422c4650760618d31447c993313805b9db
SHA512 652e3bec59f426647cdbaf9fdf3f1a73469c0bd6991b148599bb304f52ab228aceae11e40ae3861f9a04408bf837bd59877fcc4cab5ad685e0259c19ed3a48c9

/data/user/0/com.shuffle.expire/app_DynamicOptDex/SeQGnq.json

MD5 9a0e28e9e8e2f8cdc4d1cdc3ccd6d2b1
SHA1 f3e6c8eb6935e467be6e144415abeaaec4bf92b3
SHA256 402007882ca80a88aaca5e5f848d66422c4650760618d31447c993313805b9db
SHA512 652e3bec59f426647cdbaf9fdf3f1a73469c0bd6991b148599bb304f52ab228aceae11e40ae3861f9a04408bf837bd59877fcc4cab5ad685e0259c19ed3a48c9