Analysis
-
max time kernel
65s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
24-02-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
1b9f976f49c4f31bd74f0356b692c26984f193bac5173ec0221966b1f938dacb.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
1b9f976f49c4f31bd74f0356b692c26984f193bac5173ec0221966b1f938dacb.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
1b9f976f49c4f31bd74f0356b692c26984f193bac5173ec0221966b1f938dacb.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
1b9f976f49c4f31bd74f0356b692c26984f193bac5173ec0221966b1f938dacb.apk
-
Size
1.2MB
-
MD5
339b1f24e5ea9c72cd3e061c5030a510
-
SHA1
f780db687fe17c08ccb0bf63925553c2cfce32af
-
SHA256
1b9f976f49c4f31bd74f0356b692c26984f193bac5173ec0221966b1f938dacb
-
SHA512
84bbd9dcffe9a624b75d97fa1e614fde1abfcb393a6adc13c294574d5aa3b811f7f7125cf7e091648dde14d6837852f5a6ac68d204db5bd68fc9dd015a4ab70a
-
SSDEEP
24576:urxOkVCA4HNHfEioyBTyqqOdfAxLiyqP+f6brmMEXFJgzM1GcP:uNPVCtiLyBTaviVkyXEXLgzM1GcP
Malware Config
Extracted
cerberus
http://95.217.6.3
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.notice.can Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.notice.can -
pid Process 4181 com.notice.can -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.notice.can/app_DynamicOptDex/dub.json 4181 com.notice.can -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.notice.can -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.notice.can
Processes
-
com.notice.can1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4181
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54cdc9607349b59eb60ad0dbdddfc4a42
SHA157b7888ce5c919ab9367cba6b3374704a25e4733
SHA2565a4882b690d2f8becc876b0068bef5269d82b47b7fb985fb29e88c14193dde07
SHA5126fd33df7b7e35586a65039ec24ee471e78c774fc12d9c995f44a77c748e599db74a723b1eed901caae92d6e985c7d0a416b4d8551833ed6280f2045c531fe51c
-
Filesize
64KB
MD57b2eff816f885809e290381e35178e03
SHA174636f7e46eb446f71ba83bbf1b3acd7dac996af
SHA25620c18da2a89afd2d5089c784cc7830be9d5574adea31c8167c207b1e32795e88
SHA5127fe6a525360cde25ebf2535e3c35d6dc79bbcac2cac58544530540a0964cfcb232f6761006b8210c8cdde436a6a46d11b7decdc7bf5a10903f9bd13aac4ad394
-
Filesize
196B
MD5a26e0a1c886c3345b1f8b1336e85d63e
SHA198560cb345913f2b092bd452e2488aae2a5df3ae
SHA256811606b6bc5b9b80e7f5ee60f5a00bf90174ab8935e411bd9b3c77aa194442a9
SHA512438ccc7831966541c98c01424f8a1593eaec7e8000ad9e54efdc36fdad69a4a66de461ae8d3f7795563a25d2eb01861120397f60dbab03fd953172008a7f978d
-
Filesize
125KB
MD598c8aed5530a3b5f58ea809a3eb46870
SHA1f80baa9e14420ed749dc2c5eb193492fa396e19a
SHA2562ba93b45096f41e3b31cdb459050702775d8f0eb1c402759d7a7cd5a18d9246a
SHA5128859f3081159e36e5af54db5443973f1181697ecad9210b820a5b9697930037c421b97579217bb607c8b831c53c253461591abe7054a02d95f5f848e8eeacd73