Analysis
-
max time kernel
62s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
25-02-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
a4475c03d87a0804c9a25be2c8ff7d12.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
a4475c03d87a0804c9a25be2c8ff7d12.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
a4475c03d87a0804c9a25be2c8ff7d12.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
a4475c03d87a0804c9a25be2c8ff7d12.apk
-
Size
3.2MB
-
MD5
a4475c03d87a0804c9a25be2c8ff7d12
-
SHA1
44e82e4202fc37eb36827ee803537a4c8ee092b4
-
SHA256
c6b4625fa5f17b2ccd87eb3ebcf8573f84426ca150ce784d7b0e8a52281784c7
-
SHA512
db58d7caf52fd572fcb1b4405fec67d4236dd378644ac768c84a2e6ed094c5471f1eaec9ff2bf9fd26a47cdae4428d816a55689d69521531cc15a1c2a9785703
-
SSDEEP
49152:/f1JZWg4fKxRSwUBqTN3ylgy1iHcK/Cf8f3qIs754d/MH2k3Jno+UfTPj6ggH4GY:NWPfK6eTNilbbvWqIQN3F38lCiN
Malware Config
Extracted
cerberus
https://zonesdurmaz.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId catalog.where.power Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId catalog.where.power -
pid Process 5052 catalog.where.power -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/catalog.where.power/app_DynamicOptDex/nFklZcG.json 5052 catalog.where.power /data/user/0/catalog.where.power/app_DynamicOptDex/nFklZcG.json 5052 catalog.where.power -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener catalog.where.power
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD5d5ef17d1275ea704391951ce36cba3ee
SHA10ed547204f6c087b134b400862af766867623457
SHA2560f7d89d52561d220d49abd7e0995bbd858630f64f256dda28a259056e6ac1002
SHA512acab452fda07f787ef2f4c8cd80ff59d0e5d3094914f83b32089c82e1897fdd92a1a5791c3aef729adb8aef07c0a1f89fcea2e21398d093142dcde6580d141b4
-
Filesize
581KB
MD591198e6e90a88baabe0115faaf9fc3d4
SHA125cd88742344a7320f947093516fa95f0ec4e61e
SHA25657c8baa064e826176947d174943f008efbc5d425d2fb80945307f90212f91dd8
SHA51220749ec1ac03ead422b06c893c6e89a07cc963cd828826de1b4c9610a42b192d6ab7970c86cf0d94cbccaff3ad197ce942081da0d28d1cbea088557004dab4ff
-
Filesize
256B
MD59e48f8f10d293472d4ca0721bbf39336
SHA1da6cfd7273d2a8fa0644b12c37ee42160b7f7ae3
SHA25695d0ecd66d3f8757f3939684bae6e0dfba208e625f526b0aa505ee47bb605f03
SHA5122e412d180195544523749b8ead6fe229ca524334e1d901f352c1af4cc2936c887a0031c2731b920a5d7715034bc472856e04d1fe5244cb2e6d4d0507a773fe9a