Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3404185s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
02/01/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
3e65fd2988671a1dd2269fa50f2f10e8.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
3e65fd2988671a1dd2269fa50f2f10e8.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
3e65fd2988671a1dd2269fa50f2f10e8.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
3e65fd2988671a1dd2269fa50f2f10e8.apk
-
Size
3.2MB
-
MD5
3e65fd2988671a1dd2269fa50f2f10e8
-
SHA1
909231aaefcda1ec3e233111d766138e91e73897
-
SHA256
55e5211ab621f036553f7025e9a3d9446fcf84f6d6dc8f0256033d2199d53734
-
SHA512
232d1c62f45bba05f7b2688423e4d81306e4d1b05418b23585f2ffff494b7fd314313740fba60a6dedff4990efc162b23ca0663a1131f9eee6666dd5ddea4a36
-
SSDEEP
49152:rvbDTFYSO6ystCT9TVk/iE2dyIGbMHG19QnkeXlZu79qtvglSyDWnjzWIoqn7tCA:2S+stSpVS2k1jYke1479uIlNovoksSf
Malware Config
Extracted
cerberus
https://tertemizgagasetaga.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId cheese.badge.exist Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId cheese.badge.exist -
pid Process 4978 cheese.badge.exist -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/cheese.badge.exist/app_DynamicOptDex/Id.json 4978 cheese.badge.exist /data/user/0/cheese.badge.exist/app_DynamicOptDex/Id.json 4978 cheese.badge.exist -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener cheese.badge.exist
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
664KB
MD5569824fcabb0af34850441f7b016bc3a
SHA125be52d302db481822025d3715f2c26a03ab6228
SHA256d280adaa8c75a83777ee2414c61fb0b7f90420973dd8dfc2ff56b81f716deef4
SHA512b662e5588110ca1c2bd79a1f96c8921d70bf1f0c3e1a3c589be02b77a713a2cfa2d17f8ef8cc58c98d478adbb4555bbfeb614f633b79f848e3d6b6338e4e326a
-
Filesize
664KB
MD58e5a5870e99764f3c033912fe65c2c66
SHA196a0d2ef37e5eb01950c259e49456903e372ca38
SHA256fcc99f6d21665215cbeace4feffcfa42fc7eb037409bbcbac9a79f6319a16669
SHA51281be8753d23dbc8a5fbd7781d87b5713b4d932b14c01beecf87712c70517b96611d4530f21264a785dd338b2455a99c4f4ed96f7388b8434d04c08f551c010d4
-
Filesize
277B
MD57557ddd4813c8d2c755cb17362adbc2f
SHA1bb6af58265250347c444b2c0f65bc20e4f033fa3
SHA256c6d55394b7a0111ac7707b6da798268348cace6c4e90bdcef9062ffbcf5cf914
SHA512e5118c886cb35c7f9cda03dd6a3bf2f1e9f70eb50d6b8cee88df03b42c0d9b606e81ec29b251428d1b202ba7ddf98b077a3bb5cec1547b9b24754b420a7f9e06