Analysis
-
max time kernel
58s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
26-01-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
13436d21d21a1e1229d45603a5ed503ec6b916a7325fb387c9aa654aa0a112fd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
13436d21d21a1e1229d45603a5ed503ec6b916a7325fb387c9aa654aa0a112fd.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
13436d21d21a1e1229d45603a5ed503ec6b916a7325fb387c9aa654aa0a112fd.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
13436d21d21a1e1229d45603a5ed503ec6b916a7325fb387c9aa654aa0a112fd.apk
-
Size
3.3MB
-
MD5
f1405383ce3d4b7e3688a92f4ff14262
-
SHA1
4584f60bc3391ef11c00f035dbe5b34d9817c5aa
-
SHA256
13436d21d21a1e1229d45603a5ed503ec6b916a7325fb387c9aa654aa0a112fd
-
SHA512
fa661c8d2fe3b2123afaf2e8d626055940d7529b672600c2bce15709bfe5db3997f78d8d185768a5a43bfd53f07597ec1a7a1680f98eade980441baa52299cf7
-
SSDEEP
49152:zZqa9XFAIdQjvlY+36tm5en6LeXryLOZB87V92gE7EpdlmcEuVaHKVWcnTq9:zVDh6jvLqUS6CWLV5EQDpERqV5q9
Malware Config
Extracted
cerberus
http://185.177.59.179/
Signatures
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId oxygen.punch.festival Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId oxygen.punch.festival -
pid Process 5084 oxygen.punch.festival -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/oxygen.punch.festival/app_DynamicOptDex/lnAK.json 5084 oxygen.punch.festival /data/user/0/oxygen.punch.festival/app_DynamicOptDex/lnAK.json 5084 oxygen.punch.festival -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener oxygen.punch.festival
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5eb3ca2bd108f9647d7b1328543ca8e12
SHA1b7a4e9182bddb60ad01972bceeaa20e7bb5d498d
SHA2565ede27ca919ee0c5af0197f770776e7bfb94936451463d65a6748755809bb9c5
SHA512778b99ec1d7511baa643a391387a192b58f152659ab9c9de527abf25893f3bd9172bf5d7cba902a4d5b83daa2060cf6840a89ff8560446a35f6f6c6eb897a5b2
-
Filesize
713KB
MD5f64316a187642d9dd9a46487e8619f52
SHA1d8a4d89c99489836a110cf552a5c02cd74afeac6
SHA256f61fb9b03f6191fc600d9c4b83ebd58ecadc47da1f833712f4ca1e74bbc71688
SHA5129e04f91da35ae9fbaff22591718fdde95bef8f4e967b0a2aa5ed4dce47fbec20779352dd9b0602fe6bdec0387dae986895a1c0e51f2153d3693e735357fef40d
-
Filesize
285B
MD5b597c81807dc3c5e60996d2666012e7f
SHA1d694dc193d4dbc2d99821d7f06399438f5660026
SHA2562a56e4b1ce394426ffed3500b357759ee6dd1edeee5a5e02dad5b91f17e1e6c4
SHA5128592440d6ca626921bbc3803b1e6db49ef338f817228fffd3e827c572af89fef998e714792acb780a2c5df9b7287f335c909ea7d84d137e4b2fdb3b64acccef7